-
By
Despite mature technologies from firewalls to antivirus, and in the face of heightened user expectations and business needs, keeping your enterprise secure is harder than ever. Darknets offer an effective way to increate your security intelligence.
-
By
There’s lots of buzz about NAC, but what is it exactly, and why does IT already need a new approach to the technology?
-
Although the spotlight tends to shine on the poor grades federal agencies receive for their information security efforts, notable security successes in government are often overlooked.
-
By
Microsoft’s recent flurry of security acquisitions finally results in a product announcement: Microsoft Forefront Client Security.
-
Although many details are unknown, TJX’s breach reminds us once again that a lack of security can cost dearly.
-
Despite considerable work on improving security, “old, errant code” exposes flaw in Microsoft Vista.
-
By
How can an enterprise manage the influx of security events in both physical and IT silos that have traditionally operated independently but are now coming together? We offer seven suggestions.
-
If you have an AS/400 or iSeries, PowerTech Group wants you to update your security model—and a recent study suggests you should pay close attention
-
Mobile data management: a risk vs. reward scenario for business. Mobile data management presents a classic risk vs. reward scenario for business. While mobile devices are all but essential for many aspects of business, the risk of lost or stolen data is significant. Learn how companies are controlling the risk around these proliferating devices by assessing critical areas of mobile data management.
-
Network access control—or entitlement control, as Securent calls it—is all about authentication, access, and authorization.
-
By
Network access control is a hot topic, and there’s more clarity than marketing hype about the technology. We look at the basics of NAC and where it’s headed.
-
By
A security vulnerability in AJAX-based applications will challenge development teams but is unlikely to slow AJAX’s rapid growth.
-
Antivirus/antispyware package get upgrades while small and mid-size businesses get backup and migration tools
-
Vanguard wants the mainframe to be the center of security
-
Versions offers more management, more integration, and more compliance
-
Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.
-
Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.
-
By
While a NAC solution blocks infected endpoints from entering the network, what happens when a connected PC becomes non-compliant?
-
Compliance is often a matter of managing change
-
Symantec Corp.’s Advanced Threat Research team reports that Windows Vista does deliver tangible security improvements—but Vista is still far from invulnerable.
-
By
IT is still largely unprotected from one area of enterprise risk: the insider threat.
-
By
Two strategies and a dozen tips help you improve your user’s NAC
-
Microsoft doesn’t put enough edge into its security products, yet.
-
The Daylight Saving Time changes may not have the impact of Y2K, but the ripples may give IT managers heartburn nonetheless
-
In the second of our two-part series, Michigan’s CISO discusses planning for pandemics and other natural (and even man-made) disasters.