Experts predict imminent SEM market consolidation. The upside: lower software costs, easier usability, and improved efficiency. Even so, users will be faced with a dizzying array of options.
New anti-spyware functionality highlights the enterprise security question: should you go for best of breed or opt for a security suite?
A new study shows spyware is the fastest-growing threat to enterprises.
Dealing with an e-mail worm targeting a Web application, and a vulnerability in IBM DB2. Plus, how to create a performance metrics program.
Regulations are driving companies to audit their security logs. To help collect and analyze all that data, companies can turn to free syslog software and off-the-shelf security event management software. Which approach is right for you?
Changes target regulatory compliance, auditing, and access controls
How to evaluate the security of applications you build or buy, and justify those requirements to senior management.
Most college Web sites lack online privacy policies. What does that say about their ability to secure people’s private information and to avoid data breaches?
Vista’s arrival will shake up the $3.6 billion Windows security market. Here are the implications for IT managers.
Microsoft moves to patch a “zero-day” Word vulnerability. Meanwhile in a first, a new worm arrives bearing its own browser—the better to launch drive-by download attacks.
Are content management systems up to SOX compliance? Also, how spyware affects small and medium-size businesses.
Employee abuse of an organization’s Internet access -- from running outcall services to illicitly selling a company’s products on eBay -- illustrate URL filtering and monitoring issues. Enterprises cite inappropriate content, productivity concerns, and lost bandwidth as reasons to monitor their employees’ Web use.
A projected decrease in next year’s IT budget growth has unclear implications for security spending. Meanwhile, rootkits grow more virulent.
Options proliferate for encrypting your z/OS backup tapes
What’s the best way to stop users from inadvertently compromising your company’s information security?
Why small and medium-size businesses, and satellite offices, are increasingly adopting multi-function security appliances.
New standard specifies XML framework for identity management and provisioning
Faced with decreased security spending and executives who decry the state of security reporting, security managers need better report-writing skills.
With IM use increasing 200 percent per year, unmanaged enterprise IM is a growing security risk. Plus, Check Point pushes one-console management for perimeter, internal, Web, and endpoint security.
Patching remains a manual, time-intensive process, despite more automated tools.