Network access control—or entitlement control, as Securent calls it—is all about authentication, access, and authorization.
Network access control is a hot topic, and there’s more clarity than marketing hype about the technology. We look at the basics of NAC and where it’s headed.
A security vulnerability in AJAX-based applications will challenge development teams but is unlikely to slow AJAX’s rapid growth.
Antivirus/antispyware package get upgrades while small and mid-size businesses get backup and migration tools
Vanguard wants the mainframe to be the center of security
Versions offers more management, more integration, and more compliance
Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.
While a NAC solution blocks infected endpoints from entering the network, what happens when a connected PC becomes non-compliant?
Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.
Compliance is often a matter of managing change
Symantec Corp.’s Advanced Threat Research team reports that Windows Vista does deliver tangible security improvements—but Vista is still far from invulnerable.
IT is still largely unprotected from one area of enterprise risk: the insider threat.
Two strategies and a dozen tips help you improve your user’s NAC
Microsoft doesn’t put enough edge into its security products, yet.
The Daylight Saving Time changes may not have the impact of Y2K, but the ripples may give IT managers heartburn nonetheless
In the second of our two-part series, Michigan’s CISO discusses planning for pandemics and other natural (and even man-made) disasters.
In the first of a two-part series, we talk with Michigan CISO Dan Lohrmann about his experience with security, consolidation, and public- versus private-sector considerations.
Hackers can take control of a Vista machine
What's on SPI Labs' list of top Web application security threats it expects this year?
As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.