Despite the security weaknesses of FTP, there are several approaches IT can take to use the protocol safely.
Fact: Information systems are porous. Most companies will, despite their best efforts, allow some level of data exposure during the next year. Are you ready? Learn the tools and processes you need in place now to control data-breach damage, perform digital forensics, and gather the evidence required to recover and reduce risk.
To learn about good IT security management practices for your enterprise, take a lesson from a casino.
IT security has changed in the last 30 years; we look back and explore what IT must do now to get a better grip on the environment.
Why database-auditing software is critical to protecting your company’s assets
Effective implementation of server and domain isolation requires complete network visibility throughout the OS migration process
A smaller footprint may reduce security risks in Windows Server 2008
IT management will face challenges unless it lays the groundwork for the growing ubiquity of encryption
Security professionals claim it’s possible to bypass service-side security settings using RDP 6.0 clients.
IT may need to install a memory-leak fix for Windows Installer before other security-related updates can be installed.
A new nonprofit industry group works to push IEEE 802.1x as the basis for open source client-side security.
Despite mature technologies from firewalls to antivirus, and in the face of heightened user expectations and business needs, keeping your enterprise secure is harder than ever. Darknets offer an effective way to increate your security intelligence.
There’s lots of buzz about NAC, but what is it exactly, and why does IT already need a new approach to the technology?
Although the spotlight tends to shine on the poor grades federal agencies receive for their information security efforts, notable security successes in government are often overlooked.
Microsoft’s recent flurry of security acquisitions finally results in a product announcement: Microsoft Forefront Client Security.
Although many details are unknown, TJX’s breach reminds us once again that a lack of security can cost dearly.
Despite considerable work on improving security, “old, errant code” exposes flaw in Microsoft Vista.
How can an enterprise manage the influx of security events in both physical and IT silos that have traditionally operated independently but are now coming together? We offer seven suggestions.
If you have an AS/400 or iSeries, PowerTech Group wants you to update your security model—and a recent study suggests you should pay close attention
Mobile data management: a risk vs. reward scenario for business. Mobile data management presents a classic risk vs. reward scenario for business. While mobile devices are all but essential for many aspects of business, the risk of lost or stolen data is significant. Learn how companies are controlling the risk around these proliferating devices by assessing critical areas of mobile data management.