Labor Day marks the move-in for most students, and it also marks the beginning of labor-intensive work for IT departments across colleges and universities nationwide. Find out what one institution is doing to secure its network for the school year.
Many CIOs arrived late to Sarbanes-Oxley efforts
One search engine is developing a solution that helps users secure their data from phishing attacks.
Security remains a key reason some developers shy away from service-oriented architectures. IBM’s new release may help change that.
A defense contractor turns to admission controls to meet government requirements to secure national security information.
Demonstrations at last week's annual Black Hat cybersecurity conference employed Web-page-embedded JavaScript to attack corporate servers.
Symantec survey focused on IT professionals’ views on vulnerability research and challenges they expect in the next year.
New study highlights commonalities between companies with the fewest IT compliance deficiencies.
Three key benefits of trusted computing, and what IT should do now to prepare for trusted computing initiatives
A dangerous developer mentality can lead to mistakes that leave the most precious of applications susceptible to hackers
New online risk-monitoring and strong-authentication technologies are helping banks meet looming FFIEC online authentication deadlines
Employees who copy data to thumb drives or use the Print Screen button and carry that paper home pose a big threat to any organization.
Companies are increasingly deploying filtering technology to address a number of information security threats, ranging from in-bound spyware to unapproved use of VoIP.
Can companies use built-in ERP capabilities to better automate their IT controls?
The challenge: securing an infrastructure you don’t control
With the risks in today’s world, one company is taking the “fear” out of Web services with improved app scanning software that puts the developer in the driver’s seat.
One company blocks real-time attacks, demonstrates compliance, and relays security effectiveness to executives.
Why organizations are increasingly adopting the IT Infrastructure Library
Despite increased security spending, the number of security breaches also increases. Plus, how Trojan applications have displaced worms and viruses as top threats—and why.
Thanks to immature standards, competing protocols, and nascent products, keeping VoIP secure isn’t easy. Here’s where to start.