-
Best practices for managing groups in Active Directory.
-
Symantec spent more than half a billion dollars to buy its way into the SaaS e-mail and Web security segments
-
By
New research from Aberdeen shows how Best-in-Class companies are getting the most out of unified threat management technologies and services.
-
By
Why automated security policy management should be part of IT's overall data security compliance strategy.
-
McAfee's acquisition of Secure Computing could trigger a round of consolidation and disrupt the security status quo for vendors and customers alike
-
By
Why biometrics haven't been adopted faster
-
By
Choosing a security services provider can be tricky. We explain the key decisions and considerations you must make.
-
A new survey shows that enterprise networking groups -- not IT security pros -- are usually responsible for day-to-day NAC administration.
-
Why IT must adopt an information-centric view of security.
-
Forrester says IT security is in a "renaissance period"
-
How to handle the special security risks posed by portable devices
-
By
Results of AberdeenGroup research shed light on best practices in vulnerability management
-
A new survey finds that nearly 9 out of 10 IT employees say they'd steal privileged or confidential information if they knew they were going to be laid-off tomorrow.
-
By
How to protect yourself from the threats posed by unified communications.
-
Customers want integrated -- and highly manageable -- security tools. A smorgasbord of best-of-breed tools just can't get it done anymore
-
By
Your employees may take the corporate laptop on summer holiday and bring back security risks to your network
-
With the right investigative techniques, experts maintain, fraud-busters can connect the dots, uncover evidence, and combat fraud
-
By
Strong, effective IT security can be compromised by orphaned accounts and entitlements. We offer strategies to manage these expired accounts and entitlements.
-
SQL injection vulnerabilities are easy -- and cheap -- to test for, regardless of whether you're a good guy or a malicious hacker
-
A security researcher's speculation about a DNS flaw ignites another firestorm for full and responsible disclosure
-
By
Is there a holistic solution for ensuring the secure, fast, and reliable delivery of applications?
-
Thanks to this month's DNS vulnerabilities, a lot of patching will be taking the time of DNS administrators. In fact, it might even seem like 2002 all over again.
-
By
Microsoft officials warn of a problem that arises after users apply a DNS patch to Windows XP and 2000.
-
Enterprise security is an expensive proposition – one that's likely to get even more expensive as organizations take steps to protect themselves.
-
As attackers increasingly target browser flaws, the Firefox update scheme serves as a model for the industry