-
New study highlights commonalities between companies with the fewest IT compliance deficiencies.
-
By
Three key benefits of trusted computing, and what IT should do now to prepare for trusted computing initiatives
-
Demonstrations at last week's annual Black Hat cybersecurity conference employed Web-page-embedded JavaScript to attack corporate servers.
-
A dangerous developer mentality can lead to mistakes that leave the most precious of applications susceptible to hackers
-
New online risk-monitoring and strong-authentication technologies are helping banks meet looming FFIEC online authentication deadlines
-
By
Employees who copy data to thumb drives or use the Print Screen button and carry that paper home pose a big threat to any organization.
-
Companies are increasingly deploying filtering technology to address a number of information security threats, ranging from in-bound spyware to unapproved use of VoIP.
-
The challenge: securing an infrastructure you don’t control
-
Can companies use built-in ERP capabilities to better automate their IT controls?
-
With the risks in today’s world, one company is taking the “fear” out of Web services with improved app scanning software that puts the developer in the driver’s seat.
-
One company blocks real-time attacks, demonstrates compliance, and relays security effectiveness to executives.
-
Why organizations are increasingly adopting the IT Infrastructure Library
-
Despite increased security spending, the number of security breaches also increases. Plus, how Trojan applications have displaced worms and viruses as top threats—and why.
-
Thanks to immature standards, competing protocols, and nascent products, keeping VoIP secure isn’t easy. Here’s where to start.
-
Experts predict imminent SEM market consolidation. The upside: lower software costs, easier usability, and improved efficiency. Even so, users will be faced with a dizzying array of options.
-
New anti-spyware functionality highlights the enterprise security question: should you go for best of breed or opt for a security suite?
-
A new study shows spyware is the fastest-growing threat to enterprises.
-
Dealing with an e-mail worm targeting a Web application, and a vulnerability in IBM DB2. Plus, how to create a performance metrics program.
-
Regulations are driving companies to audit their security logs. To help collect and analyze all that data, companies can turn to free syslog software and off-the-shelf security event management software. Which approach is right for you?
-
Changes target regulatory compliance, auditing, and access controls
-
How to evaluate the security of applications you build or buy, and justify those requirements to senior management.
-
Most college Web sites lack online privacy policies. What does that say about their ability to secure people’s private information and to avoid data breaches?
-
Vista’s arrival will shake up the $3.6 billion Windows security market. Here are the implications for IT managers.
-
Microsoft moves to patch a “zero-day” Word vulnerability. Meanwhile in a first, a new worm arrives bearing its own browser—the better to launch drive-by download attacks.
-
Are content management systems up to SOX compliance? Also, how spyware affects small and medium-size businesses.