Security


Laptop Security: Hackers Attack Encrypted Data on Chips

Sleeping laptops may be the next way hackers steal encrypted information

Podcast: Security and Managed File Transfers

We’ve all attached a file to an e-mail, but enterprises need a way to transfer large files securely. To explain the requirements, approaches, and options, we spoke with Ellen Ohlenbusch at GlobalSCAPE

Hackers Using Time-Tested Methods, Not Fancy Technology

ID theft usually involves time-tested methods such as telephone fraud than blockbuster data breaches

Reported Drop in Security Threats Masks Their Severity

The number of new vulnerabilities disclosed by researchers actually declined in 2007 -- the first time that’s happened since 2003 -- but it’s not all good news.

Rogue Trader Highlights Need to Mind Your Controls

In an age of Sarbanes-Oxley and similar regulatory measures, how could a single rogue trader have racked up more than $7 billion in losses?

Podcast: Securing the Enterprise from Employee Activities

After you’ve protected your environment from outside threats such as viruses, it’s time to turn your attention inward and protect against threats from your employees themselves.

Enterprise Security: The Human Factor

Why organizations need to get serious about security awareness training



Why Securing Mobile Devices Keeps CIOs Up at Night

With mobile security, the devil you don’t know can hurt you much more than the devil you think you know

Protecting Your Enterprise from the Thriving Cyber Underground

Multiple, overlapping, and mutually supportive defensive systems and patched, up-to-date systems can help consumers and businesses take advantage of the Internet while avoiding its dangers.

IM Security Exploits Explode in 2007

It's time to finally get serious about locking down IM

Podcast: Vulnerability Predictions for 2008

It’s been a tough year for protecting the enterprise. We review a security expert’s predictions for 2007, explore what’s been driving the rash of new vulnerabilities, and look ahead with him to the security problems that will dominate 2008.

Security in Review: Yesterday and Tomorrow

Will it be "same old, same old" in security for 2008?

Research Reveals Steps to Protect Sensitive Data

A new report from the IT Policy Compliance Group examined leaders and laggards to identify core competencies and steps to improve data protection.

Compliance and Security, Part 3: Handling the Off Stream

Compliance applies to the entire infrastructure, even the many crannies of heterogeneous environments.

Preventing NAC Attacks

Industry standards and trusted hardware keep out unauthorized users and equipment

Compliance and Security, Part 2: Uniting Efforts

In the second of three parts, unifying security, compliance, and risk assessment get better results

Compliance and Security: The Changing Environment, Part 1

In this first part of a three-part series, we look at how compliance continues to change IT security and response to risk

Minding the Network Behavior

Can products such as Lancope’s Stealthflow spot security problems and network bottlenecks?

Breaking Through the Cyberattack Noise with SIEM

Security information and event management (SIEM) can help administrators track security data in a networked environment and counter potential threats.

CA Upgrades Security for z/OS

New versions more about people than features.