Security


Yet Another Word Zero-Day Exploit Surfaces

A new exploit potentially lets an attacker execute code on a user’s machine

PGP: Encryption Everywhere

PGP Corporation may have the handle on protecting sensitive data everywhere

Beyond the Firewall: Protecting Information Outside the Network

Information protection has transformed from protecting the network to protecting the information -- wherever it resides.

Updated Security Information Manager Tackles Massive Event Logs

SIM adds real-time capabilities but compliance, not threats, stills drives this market

Step by Secure Step: Network Security Planning

With a little prioritization, setting up a network security plan doesn't have to eat up all your time.

Why It’s Time for Network Access Control

Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.

A Loaf, a Phish, and a Reputation

Spam and phishing attacks are getting worse, and new Web threats will complicate networks until some reputations are established



NAC, Vista, and Your Security Strategy

We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.

Podcast: Strategies for Effective Data Protection

With the data inside the data center secured, IT must now address the problems of a growing mobile work force. We discuss how enterprise data protection has changed and where it’s headed.

Big Blue’s Big-Iron Security Trump Card

IBM is pushing a retro database security model: bring it all back home to the mainframe, and trust the security and privacy of Big Iron

Study Reveals What’s Driving Network Access Control

A majority of survey respondents looking to implement an NAC solution want to reduce malware incidents, control remote access to the network, and enforce endpoint configurations.

Security: A Look Back and the Year Ahead

From smarter criminals to network access protection, IT is going to have its hands full in 2007.

Podcast: Security Threats: What Lies Ahead

A look back at this year’s security threats, predictions for 2007, and a low-cost way for any IT organization to protect data that requires no special equipment or software.

CA Makes Federated Access Management Easier

Significant changes in CA products are worth a look

Symantec Announces Security Enhancement Tools for Microsoft Exchange Server 2007

Symantec Corp. is first out of the gate to announce companion products to Microsoft’s updated Exchange Server 2007

Data Encryption: The Whole-Disk Option

For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.

NAC: Remediation and Integration

Options for notification and remediation, as well as NAC integration techniques and technologies.

NAC Testing Options: Validating Endpoints and Their Health

In the second part of our three-part series about network access/admission control, we examine considerations when testing the health of endpoint devices

Unified Threat Management: Think Beyond Appliances

UTMs are effective for the perimeter, but when it comes to remote offices, don’t shirk the rest of your security needs.

Podcast: Outsourcing Security

From zero-hour protection to safeguarding mobile devices, we explore what security functions you can outsource and the characteristics of companies that do so