-
A trojan targeting Monster.com shows that protection from the center to the edge -- and beyond -- is still needed.
-
The bad guys are targeting consumers, but enterprises still pay
-
IPLocks takes a double play on securing databases. One analyst advises you look at your needs or you’ll strike out.
-
By
Just as fast as spyware changes, IT must adapt in its fight against the intrusions. We explore best practices to help your enterprise avert spyware threats.
-
By
Web apps are the next frontier for hackers. Learn what IT must do to stay protected.
-
Rowing though the backwaters may keep you more secure
-
By
How cybercriminals are changing the way they target IT assets
-
Security isn’t a current stumbling block for Oracle 11g and Applications Security Inc. represents a breed plugging database security gaps
-
The Fortunes may soon smile on the combination of Postini’s communications security and Google’s SOA.
-
Before unleashing sites and software, these products will spotlight code that can leave you vulnerable
-
By
Secure Sockets Layer encryption presents a tradeoff between keeping data private and allowing for network monitoring and the detection of intruders. The solution: transparent SSL proxies.
-
Ohio State University’s CISO Charles Morrow-Jones looks at the cost of guarding against breaches, plus a best practice for all IT shops.
-
By
Securing SOA and Web services poses challenges for IT administrators. We look at several best practices and suggest how organizations should manage the transition to SOA and Web Services from a security perspective.
-
Ohio State University’s CISO Charles Morrow-Jones explains how the distributive, collaborative environment of a university affects security.
-
By
Despite the security weaknesses of FTP, there are several approaches IT can take to use the protocol safely.
-
IT security has changed in the last 30 years; we look back and explore what IT must do now to get a better grip on the environment.
-
Fact: Information systems are porous. Most companies will, despite their best efforts, allow some level of data exposure during the next year. Are you ready? Learn the tools and processes you need in place now to control data-breach damage, perform digital forensics, and gather the evidence required to recover and reduce risk.
-
By
To learn about good IT security management practices for your enterprise, take a lesson from a casino.
-
By
Effective implementation of server and domain isolation requires complete network visibility throughout the OS migration process
-
Why database-auditing software is critical to protecting your company’s assets
-
A smaller footprint may reduce security risks in Windows Server 2008
-
By
IT management will face challenges unless it lays the groundwork for the growing ubiquity of encryption
-
Security professionals claim it’s possible to bypass service-side security settings using RDP 6.0 clients.
-
IT may need to install a memory-leak fix for Windows Installer before other security-related updates can be installed.
-
A new nonprofit industry group works to push IEEE 802.1x as the basis for open source client-side security.