Security


Securent Middleware Moves Authorization Out of Individual Apps

Network access control—or entitlement control, as Securent calls it—is all about authentication, access, and authorization.

Getting the NAC of Network Access Control

Network access control is a hot topic, and there’s more clarity than marketing hype about the technology. We look at the basics of NAC and where it’s headed.

JavaScript Hijacking Vulnerability May Not Dampen AJAX Enthusiasm

A security vulnerability in AJAX-based applications will challenge development teams but is unlikely to slow AJAX’s rapid growth.

CA Updates Security Products for Enterprises Big and Small

Antivirus/antispyware package get upgrades while small and mid-size businesses get backup and migration tools

Moving Security to the Mainframe

Vanguard wants the mainframe to be the center of security

Novell Security Updates Focus on Flexibility, Integration

Versions offers more management, more integration, and more compliance

Access Control: 10 Best Practices

Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.



Access Control: 10 Best Practices

Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.

Why NAC Alone Is Not Enough

While a NAC solution blocks infected endpoints from entering the network, what happens when a connected PC becomes non-compliant?

Configuration Management: Ecora Auditor Pro and Tripwire Enterprise

Compliance is often a matter of managing change

The Verdict on Vista Security: A Mixed Bag

Symantec Corp.’s Advanced Threat Research team reports that Windows Vista does deliver tangible security improvements—but Vista is still far from invulnerable.

The Internal Security Mindset: Getting Your Head in the Game

IT is still largely unprotected from one area of enterprise risk: the insider threat.

Network Admission Control: Balancing Security and the User Experience

Two strategies and a dozen tips help you improve your user’s NAC

Microsoft Forefront: Strictly Business

Microsoft doesn’t put enough edge into its security products, yet.

A Guide to Daylight Saving Time Updates

The Daylight Saving Time changes may not have the impact of Y2K, but the ripples may give IT managers heartburn nonetheless

Planning for Pandemics and Other Disasters

In the second of our two-part series, Michigan’s CISO discusses planning for pandemics and other natural (and even man-made) disasters.

Cyberethics: What the Public and Private Sector Misses

In the first of a two-part series, we talk with Michigan CISO Dan Lohrmann about his experience with security, consolidation, and public- versus private-sector considerations.

Vista Buffer-Overflow Vulnerabilities Exposed

Hackers can take control of a Vista machine

CA Unveils Host-Based Intrusion Prevention System

As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.

New Online Threats for the New Year

What's on SPI Labs' list of top Web application security threats it expects this year?