Research shows hardware appliances are primary avenue for security software delivery
Look for more sophisticated information attacks this year.
Like it or not, instant messaging (IM) is one communication tool that's here to stay. Many users are ecstatic about IM: It's quicker than e-mail and less intrusive than the telephone. It's also riddled with security challenges.
Managed solutions provide high-end protection at low cost for small- to medium-sized businesses.
Patent Issue for Liberty Alliance; New Window Vulnerability Found; PDFs Threaten Unix, Linux; CipherShare Product Secures Windows Assets
Redmond hopes to increase enterprise use of its single sign-on solution.
Is your security plan working? A study suggests that whatever your company is doing right now, it probably isn't enough.
It's not always the threat of security breaches from the outside that needs your attention. Sometimes the problem comes from inside your company, and it isn't always intentional.
From networking intrusion to virus detection, the basic security paradigms really haven't changed much in the past.
Take one look at the tangle of cables connecting the computer to its monitor, peripherals and printers, and it’s not hard to imagine how someone thought "wireless." Sample the wireless 802.11b network (a.k.a. Wi-Fi and AirPort) in a café after crawling around on your hands and knees underneath your desk trying to find a live Ethernet port.
Web services—one of the latest waves in business and technology—is closer to reality now that we almost have an agreed-upon security framework: Security Assertions Markup Language (SAML). It may soon be possible for companies to use Web services securely.
Computer forensics involves knowing where to look for data when a criminal attempts to destroy evidence. Find out how and where to seek data that can lead to catching a criminal.
A hardened operating systems brings security to the Bahá‘í International Community's Web site.
Impending pressure from the FBI or Congress may force companies to share evidence of break-ins, or disclose the SEC level of information security preparedness. Is your company ready?
A hardened operating systems brings security to the Bahá‘í International Community's Web site.
What's really happened to the security of information technology since Sept. 11?
Once you've been attacked, it's far too late. A good diagnostics system, more commonly known as a forensic program, can provide that preparation.
You've convinced top management, got the funding, and hired a crackerjack security staff. Congratulations! Now comes the really hard part. Having a good security staff won't mean a thing if those security pros aren't effectively integrated into your company, and if they can't develop solid lines of communication.
Announced at RSA Conference
The good news: Administering stand-alone mainframe security is easy. The bad: Finding people skilled at securing a mainframe in a distributed environment is very hard.