-
By
We’ve all attached a file to an e-mail, but enterprises need a way to transfer large files securely. To explain the requirements, approaches, and options, we spoke with Ellen Ohlenbusch at GlobalSCAPE
-
ID theft usually involves time-tested methods such as telephone fraud than blockbuster data breaches
-
The number of new vulnerabilities disclosed by researchers actually declined in 2007 -- the first time that’s happened since 2003 -- but it’s not all good news.
-
In an age of Sarbanes-Oxley and similar regulatory measures, how could a single rogue trader have racked up more than $7 billion in losses?
-
By
After you’ve protected your environment from outside threats such as viruses, it’s time to turn your attention inward and protect against threats from your employees themselves.
-
Why organizations need to get serious about security awareness training
-
With mobile security, the devil you don’t know can hurt you much more than the devil you think you know
-
By
Multiple, overlapping, and mutually supportive defensive systems and patched, up-to-date systems can help consumers and businesses take advantage of the Internet while avoiding its dangers.
-
It's time to finally get serious about locking down IM
-
By
It’s been a tough year for protecting the enterprise. We review a security expert’s predictions for 2007, explore what’s been driving the rash of new vulnerabilities, and look ahead with him to the security problems that will dominate 2008.
-
Will it be "same old, same old" in security for 2008?
-
A new report from the IT Policy Compliance Group examined leaders and laggards to identify core competencies and steps to improve data protection.
-
Compliance applies to the entire infrastructure, even the many crannies of heterogeneous environments.
-
By
Industry standards and trusted hardware keep out unauthorized users and equipment
-
In the second of three parts, unifying security, compliance, and risk assessment get better results
-
In this first part of a three-part series, we look at how compliance continues to change IT security and response to risk
-
Can products such as Lancope’s Stealthflow spot security problems and network bottlenecks?
-
By
Security information and event management (SIEM) can help administrators track security data in a networked environment and counter potential threats.
-
New versions more about people than features.
-
Getting into the sandbox might make you more secure
-
What keeps notebook data safe is moving deeper into the enterprise
-
By
How to enforce network access policies with confidence and without disruptions.
-
Technology isn’t the only answer to tackling this "tricky" vulnerability
-
Teach a person about phish and you help online commerce
-
By
Whitelisting isn’t just useful for blocking an avalanche of unwanted e-mail. It’s now being used to secure systems by limiting what applications are allowed to run.