Security


Case Study: Wireless Provider's Remote Access Success

Giving mobile users access to enterprise applications and internal portals via an SSL VPN can be tricky. Midwest Wireless' implementation was exceptionally smooth. What's their secret?

Layering is Key to Countering Zero-Hour Attacks

Post-virus attack cleanup costs $200 per system. Taking a layered approach to protection can help keep your PCs safe.

Case Study: Outsourcing Threat Detection

With an increasing number of threats and limited IT staff resources, one company turns to outsourcing network monitoring

Q&A: Natural Disasters Drive Renewed Focus on Backup/Recovery Plans

Best practices for creating your disaster recovery plans

Virtual Patching Secures Web Applications

Discovering Web application vulnerabilities—which account for a staggering majority of all vulnerabilities seen in the wild—is the easy part. Keeping them fixed is another story.

Oracle Database Passwords Vulnerable to Attack

Using a password hash, attackers can crack a database in about four minutes

Q&A: Monitoring What Web Applications Divulge

Watching inbound and outbound Web applications communications for signs of attack



Forensic Contingency Planning: Where to Start

A forensic readiness program helps a company protect its assets and know when they’ve been compromised.

Case Study: Furthering Role-Based Access

Securing access in the post-mainframe world

How Data Security Breaches Hit the Bottom Line

A new survey reveals the best way to deal with breaches

Preventing Risky Password Practices

Users hate passwords, and it shows.

Regulations Drive Whole-Disk Encryption

With the average public data breach costing $7.5 million to clean up, security managers seek automated hard disk encryption.

Under-the-Radar Danger

How do you stop stealth endpoint malware not even your antivirus vendor knows about?

Bot Networks and Modular Code Target Enterprises

Increased attacks are driven by money and modularity.

Improving Automated Vulnerability Remediation

Given the incredibly small window afforded IT managers for patching vulnerable systems, security experts recommend getting help in categorizing vulnerabilities as well as in determining which are actually present.

Q&A: Harnessing Trusted Computing Modules

Planning identity management or authentication rollouts? Don’t forget to factor in the Trusted Computing Modules now built into many PCs.

Sarbanes-Oxley: Enterprises Turning to Automation

Automated security and access controls get top attention as enterprises move into their second year of Sarbanes-Oxley compliance.

Web Services: Where Identity Management Goes From Here

SAML, Liberty, WS-Federation—a number of Web Services standards are competing for security managers’ attention. Here’s how to differentiate between the options.

Putting IPS Claims to the Test

A neutral, third-party testing organization rates IPS performance, accuracy, and reliability.

Q&A: Targets Shift for Application Security Attacks

With attackers gunning for sensitive information, it’s time to rethink Web application code development or face the consequences.