Companies favor security technology, overlook adequate user training
Post-virus attack cleanup costs $200 per system. Taking a layered approach to protection can help keep your PCs safe.
With an increasing number of threats and limited IT staff resources, one company turns to outsourcing network monitoring
Best practices for creating your disaster recovery plans
Discovering Web application vulnerabilities—which account for a staggering majority of all vulnerabilities seen in the wild—is the easy part. Keeping them fixed is another story.
Using a password hash, attackers can crack a database in about four minutes
Watching inbound and outbound Web applications communications for signs of attack
A forensic readiness program helps a company protect its assets and know when they’ve been compromised.
Securing access in the post-mainframe world
A new survey reveals the best way to deal with breaches
Users hate passwords, and it shows.
With the average public data breach costing $7.5 million to clean up, security managers seek automated hard disk encryption.
How do you stop stealth endpoint malware not even your antivirus vendor knows about?
Increased attacks are driven by money and modularity.
Given the incredibly small window afforded IT managers for patching vulnerable systems, security experts recommend getting help in categorizing vulnerabilities as well as in determining which are actually present.
Planning identity management or authentication rollouts? Don’t forget to factor in the Trusted Computing Modules now built into many PCs.
Automated security and access controls get top attention as enterprises move into their second year of Sarbanes-Oxley compliance.
SAML, Liberty, WS-Federation—a number of Web Services standards are competing for security managers’ attention. Here’s how to differentiate between the options.
A neutral, third-party testing organization rates IPS performance, accuracy, and reliability.
With attackers gunning for sensitive information, it’s time to rethink Web application code development or face the consequences.