Security


Fixing the "Everyone" Problem in Windows Server

How to take control of default group access permissions settings for Windows Server.

7 Steps for Dealing with the People Component of Data Security

We outline seven steps that help you address the people aspect of data security.

New Year, New Threats: The Emerging Security Risks of Social Networking

Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.

Spam Takes a Holiday

Talk about post-Christmas letdowns: spam volumes tanked after December 25th. What happened -- and can it last?

Q&A: Data Protection Strategies for Mobile Computing

Best practices for protecting your mobile and enterprise assets.

Q&A: Securing Your Mobile Environment

How to improve security for mobile users in light of new, complex technologies such as cloud computing.

Security: Data Disposal 101

According to a new study, more than half of U.S. businesses aren’t erasing data from computers or storage assets prior to retiring them.



Modern Antivirus, Whitelisting, and Enterprise Security

Whitelisting applications can be a more effective and lower-impact technique for protecting your enterprise than are traditional antivirus approaches.

A Tough Year that Could Have Been Worse

Security admins faced a host of vulnerabilities and new attacks in 2010, but the nightmare scenarios that could've kept security pros up at night blessedly didn't come to pass.

Q&A: Security in a Virtualized Environment

How are IT organizations responding to the new security challenges of administrative privileges in a virtualized environment?

Database Security: Why Patching Isn't Popular with DBAs

Database security patching is a tricky business. It's so tricky, in fact, that some DBAs prefer to rely on defense-in-depth controls to protect their systems.

Tracking Trends: Data Security Risks

The top three risk trends in 2010, and what lies ahead for security professionals in 2011.

Q&A: Identity and Access Management

What’s driving the interest in identity and access management, and how can you address the challenges the technology presents?

Microsoft Investigating Windows Proof-of-Concept Flaw

Microsoft says its security team is looking into an elevation-of-privilege exploit affecting Windows-based systems.

Microsoft Document Outlines Its Cloud Security Infrastructure

Microsoft's new white paper explains the organizational and standards-based underpinnings of its cloud security efforts.

A 3-Step Defense-in-Depth Strategy for Combating Cyberterrorism

Learn how a "defense-in-depth" strategy can provide greater protection to your enterprise.

Retailers Under Attack

An upsurge in retail-oriented phishing exploits underscores the growing menace posed by targeted attacks.

Microsoft Goes Easy With November Patch Release

Microsoft's November security update arrived today, and it's something less than a Thanksgiving meal.

New IE Zero-Day Attack Surfaces

In a security advisory, Microsoft is warning users of Internet Explorer vulnerability that could allow remote code execution by hackers.

Mid-Size Enterprises are Prime Targets

Mid-size shops are increasingly -- even disproportionately -- coming under attack by hackers, yet few security budgets are rising.