Is your security plan working? A study suggests that whatever your company is doing right now, it probably isn't enough.
It's not always the threat of security breaches from the outside that needs your attention. Sometimes the problem comes from inside your company, and it isn't always intentional.
From networking intrusion to virus detection, the basic security paradigms really haven't changed much in the past.
Take one look at the tangle of cables connecting the computer to its monitor, peripherals and printers, and it’s not hard to imagine how someone thought "wireless." Sample the wireless 802.11b network (a.k.a. Wi-Fi and AirPort) in a café after crawling around on your hands and knees underneath your desk trying to find a live Ethernet port.
Web services—one of the latest waves in business and technology—is closer to reality now that we almost have an agreed-upon security framework: Security Assertions Markup Language (SAML). It may soon be possible for companies to use Web services securely.
Computer forensics involves knowing where to look for data when a criminal attempts to destroy evidence. Find out how and where to seek data that can lead to catching a criminal.
Impending pressure from the FBI or Congress may force companies to share evidence of break-ins, or disclose the SEC level of information security preparedness. Is your company ready?
A hardened operating systems brings security to the Bahá‘í International Community's Web site.
What's really happened to the security of information technology since Sept. 11?
A hardened operating systems brings security to the Bahá‘í International Community's Web site.
Once you've been attacked, it's far too late. A good diagnostics system, more commonly known as a forensic program, can provide that preparation.
You've convinced top management, got the funding, and hired a crackerjack security staff. Congratulations! Now comes the really hard part. Having a good security staff won't mean a thing if those security pros aren't effectively integrated into your company, and if they can't develop solid lines of communication.
Announced at RSA Conference
The good news: Administering stand-alone mainframe security is easy. The bad: Finding people skilled at securing a mainframe in a distributed environment is very hard.
Enterprise managers, your end users are teenagers now; they’re running amok and defying authority simply because they can. They’re doing it subtly by playing on the Internet and by obscuring their non-business use of your systems, and aggressively by destroying property when disgruntled. Ignoring these threats from within will only encourage them.
Is PKI all what it's cracked up to be?
Reaching out to as many customers as possible means corporate e-business strategies need to consider strategic approaches to e-security as well.
Just as explorers introduced disease to previously isolated populations, opening up corporate systems has added a slew of challenges. Although security policies were originally designed to keep unwanted intruders out, they now must also let the right people in, and do it as quickly and seamlessly as possible.
Rigorous security and high cost of ownership have kept mainframes safe from hackers. But as they become key players in e-business, mainframes could be at risk.