-
Post-virus attack cleanup costs $200 per system. Taking a layered approach to protection can help keep your PCs safe.
-
With an increasing number of threats and limited IT staff resources, one company turns to outsourcing network monitoring
-
Best practices for creating your disaster recovery plans
-
Discovering Web application vulnerabilities—which account for a staggering majority of all vulnerabilities seen in the wild—is the easy part. Keeping them fixed is another story.
-
Using a password hash, attackers can crack a database in about four minutes
-
Watching inbound and outbound Web applications communications for signs of attack
-
A forensic readiness program helps a company protect its assets and know when they’ve been compromised.
-
Securing access in the post-mainframe world
-
A new survey reveals the best way to deal with breaches
-
Users hate passwords, and it shows.
-
With the average public data breach costing $7.5 million to clean up, security managers seek automated hard disk encryption.
-
How do you stop stealth endpoint malware not even your antivirus vendor knows about?
-
Increased attacks are driven by money and modularity.
-
Given the incredibly small window afforded IT managers for patching vulnerable systems, security experts recommend getting help in categorizing vulnerabilities as well as in determining which are actually present.
-
Planning identity management or authentication rollouts? Don’t forget to factor in the Trusted Computing Modules now built into many PCs.
-
Automated security and access controls get top attention as enterprises move into their second year of Sarbanes-Oxley compliance.
-
SAML, Liberty, WS-Federation—a number of Web Services standards are competing for security managers’ attention. Here’s how to differentiate between the options.
-
A neutral, third-party testing organization rates IPS performance, accuracy, and reliability.
-
With attackers gunning for sensitive information, it’s time to rethink Web application code development or face the consequences.
-
New regulations mandate increased security for utilities' supervisory control and data acquisition systems
-
ISO 17799, the world’s most-used information security framework, gets updated.
-
What exactly is spyware? Just as with viruses, discussion of malware, grayware, adware, and spyware often gets hung up on definitions, and lately even legal threats over classifications.
-
Infrequent updates in security products themselves can be dangerous
-
The term “endpoint security” includes new types of technology, which makes sense when Polysius’ manager of IT details the myriad, evolving threats to his corporate network, and the company's defenses.
-
Exploits are already circulating for a recently announced Windows plug-and-play vulnerability. Experts recommend better endpoint security controls.