Security Management


Five Signs Your Enterprise Needs Distributed Security

After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.

Human Error Tops List of Vulnerabilities

Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.

Q&A: Single-System Message Management

It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.

Security Managers Report Virus Problem Worse

New report charts security manager dissatisfaction

Combating Apathy with Free Security Check

WholeSecurity gives businesses the ability to offer their customers an opt-in PC security sweep to quarantine malicious software

E-business Profits: Gone with the Criminal?

Viruses are not the only reason why interest in e-business is declining. Hackers and fraudsters are also to blame.

Compartmentalize Your Network to Improve Security

An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.

Q&A: Managing Security Through Enterprise Procurement

Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.

Ten Business Benefits of Effective Data Auditing

Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)

Top Three Security Problems Remain Despite Increased Spending

Companies turn to managed Service providers for help; desktops dominate security budgets as patches average $234 per machine.

Solving the Patch Management Headache

Best practices in keeping the desktop secure

Beyond Perimeter Defense: Securing Online Transactions

Encrypting, monitoring, and auditing access to actual data

Exploiting IM for Back-End Systems Communications

Proponents say IM can function as XML message brokers between systems at a fraction of the cost of traditional messaging middleware; putting an IM interface on a back-end application can bring big benefits.

Guarding Against Your Partner's Web Services Flaws

Coding errors in Web Services code at your partners can trigger problems on your own systems.

Best Practices: Collecting Computer Forensic Evidence

Gathering information in a legal, court-friendly way is vital if computer forensic evidence is to hold up in court.