How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Why current security tools aren’t adequate, and what vendors and IT must do now to secure their environment.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    All things considered, 2008 was a quiet but industrious year on the security front.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Employees who believe they may be fired may steal proprietary information to blackmail management
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    How deploying hardware in the data center that runs a centralized security suite that handles multiple security configurations can protect a diverse set of end users.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    An out-of-band security fix from Microsoft put administrators in a familiar but tough spot: potentially damned if they patched and damned if they didn't.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Virtualization brings a new set of security challenges.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Only 10 percent of organizations are actually using effective anti-spam technologies
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Endpoints pose security risks to an enterprise, but identifying those endpoints can be IT's biggest challenge.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Best practices for managing groups in Active Directory.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Symantec spent more than half a billion dollars to buy its way into the SaaS e-mail and Web security segments 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New research from Aberdeen shows how Best-in-Class companies are getting the most out of unified threat management technologies and services.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Why automated security policy management should be part of IT's overall data security compliance strategy.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    McAfee's acquisition of Secure Computing could trigger a round of consolidation and disrupt the security status quo for vendors and customers alike
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Why biometrics haven't been adopted faster
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Choosing a security services provider can be tricky.  We explain the key decisions and considerations you must make.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A new survey shows that enterprise networking groups -- not IT security pros -- are usually responsible for day-to-day NAC administration.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Why IT must adopt an information-centric view of security.