Security


A New Standard for Securing Optical Storage

How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.

Microsoft Pulls the Plug on Windows Live OneCare

Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.

Q&A: Security Information and Event Management

Why current security tools aren’t adequate, and what vendors and IT must do now to secure their environment.

The Year in Security and the Fresh Problems Ahead

All things considered, 2008 was a quiet but industrious year on the security front.

Survey Highlights Threats from Disgruntled Employees

Employees who believe they may be fired may steal proprietary information to blackmail management

Securing Your Enterprise with a Many-to-Many Software Deployment Model

How deploying hardware in the data center that runs a centralized security suite that handles multiple security configurations can protect a diverse set of end users.

Why Enterprises Must Respond to WPA Crack

Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA



IT's Security Dilemma: To Patch or Not to Patch

An out-of-band security fix from Microsoft put administrators in a familiar but tough spot: potentially damned if they patched and damned if they didn't.

Q&A: Security for Virtual Environments

Virtualization brings a new set of security challenges.

Most Enterprises Unprotected Against E-mail Security Risks, Study Finds

Only 10 percent of organizations are actually using effective anti-spam technologies

Q&A: Securing Your Endpoints

Endpoints pose security risks to an enterprise, but identifying those endpoints can be IT's biggest challenge.

Q&A: Managing Active Directory

Best practices for managing groups in Active Directory.

Analysis: Behind Symantec's MessageLabs Play

Symantec spent more than half a billion dollars to buy its way into the SaaS e-mail and Web security segments

Getting the Most from Your UTM

New research from Aberdeen shows how Best-in-Class companies are getting the most out of unified threat management technologies and services.

Managing Security Compliance from the Inside Out

Why automated security policy management should be part of IT's overall data security compliance strategy.

McAfee's Secure Computing Acquisition: The View from Gartner

McAfee's acquisition of Secure Computing could trigger a round of consolidation and disrupt the security status quo for vendors and customers alike

Breaking Biometrics Barriers in the Enterprise

Why biometrics haven't been adopted faster

Top Tips for Picking a Managed Security Services Provider

Choosing a security services provider can be tricky. We explain the key decisions and considerations you must make.

Survey Sheds Light on Use, Maintenance of Network Access Control

A new survey shows that enterprise networking groups -- not IT security pros -- are usually responsible for day-to-day NAC administration.

Q&A: Taming Data Breaches

Why IT must adopt an information-centric view of security.