Security


Beyond Logs: Security Event Management Market Heads For Shakeout (Part 2 of 2)

Experts predict imminent SEM market consolidation. The upside: lower software costs, easier usability, and improved efficiency. Even so, users will be faced with a dizzying array of options.

Anti-Spyware Gets Rootkit Removal

New anti-spyware functionality highlights the enterprise security question: should you go for best of breed or opt for a security suite?

Spyware Threats Skyrocket for Enterprises

A new study shows spyware is the fastest-growing threat to enterprises.

Security Briefs: JavaScript Worm, IBM DB2 Vulnerability, NIST Performance Metrics

Dealing with an e-mail worm targeting a Web application, and a vulnerability in IBM DB2. Plus, how to create a performance metrics program.

Beyond Logs: Creating a Log-Management Program (Part 1 of 2)

Regulations are driving companies to audit their security logs. To help collect and analyze all that data, companies can turn to free syslog software and off-the-shelf security event management software. Which approach is right for you?

CA Updates Mainframe Security Tools

Changes target regulatory compliance, auditing, and access controls

Q&A: The Quest (and Justification) for Trustworthy Code

How to evaluate the security of applications you build or buy, and justify those requirements to senior management.



Why Colleges Fail the Privacy Test

Most college Web sites lack online privacy policies. What does that say about their ability to secure people’s private information and to avoid data breaches?

How Vista’s Arrival Will Affect the Security Market

Vista’s arrival will shake up the $3.6 billion Windows security market. Here are the implications for IT managers.

Beware Active Microsoft Word Vulnerability, Rogue Browser

Microsoft moves to patch a “zero-day” Word vulnerability. Meanwhile in a first, a new worm arrives bearing its own browser—the better to launch drive-by download attacks.

CIOs Lack Content Control; Spyware Guns for SMBs

Are content management systems up to SOX compliance? Also, how spyware affects small and medium-size businesses.

Best Practices for Effective URL Filtering and Monitoring

Employee abuse of an organization’s Internet access -- from running outcall services to illicitly selling a company’s products on eBay -- illustrate URL filtering and monitoring issues. Enterprises cite inappropriate content, productivity concerns, and lost bandwidth as reasons to monitor their employees’ Web use.

2007 Tech Budgets to Decline; Stealth Malware on the Rise

A projected decrease in next year’s IT budget growth has unclear implications for security spending. Meanwhile, rootkits grow more virulent.

CA Rolls Out Tape Encryption for Mainframes

Options proliferate for encrypting your z/OS backup tapes

Employees Cause Most Security Breaches, Yet Response Lags

What’s the best way to stop users from inadvertently compromising your company’s information security?

Q&A: Stopping Blended Threats with Multi-Function Security Appliances

Why small and medium-size businesses, and satellite offices, are increasingly adopting multi-function security appliances.

Executives Unhappy with Current Security Metrics

Faced with decreased security spending and executives who decry the state of security reporting, security managers need better report-writing skills.

Web Services Gets SPML 2.0 Boost

New standard specifies XML framework for identity management and provisioning

Security Briefs: Risky IM; Pushing All-In-One Security Management Consoles

With IM use increasing 200 percent per year, unmanaged enterprise IM is a growing security risk. Plus, Check Point pushes one-console management for perimeter, internal, Web, and endpoint security.

Why Automated Patch Management Remains Elusive

Patching remains a manual, time-intensive process, despite more automated tools.