-
In the first of a two-part series, we talk with Michigan CISO Dan Lohrmann about his experience with security, consolidation, and public- versus private-sector considerations.
-
Hackers can take control of a Vista machine
-
As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.
-
By
What's on SPI Labs' list of top Web application security threats it expects this year?
-
A new exploit potentially lets an attacker execute code on a user’s machine
-
PGP Corporation may have the handle on protecting sensitive data everywhere
-
By
Information protection has transformed from protecting the network to protecting the information -- wherever it resides.
-
SIM adds real-time capabilities but compliance, not threats, stills drives this market
-
By
With a little prioritization, setting up a network security plan doesn't have to eat up all your time.
-
Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.
-
Spam and phishing attacks are getting worse, and new Web threats will complicate networks until some reputations are established
-
We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.
-
By
With the data inside the data center secured, IT must now address the problems of a growing mobile work force. We discuss how enterprise data protection has changed and where it’s headed.
-
IBM is pushing a retro database security model: bring it all back home to the mainframe, and trust the security and privacy of Big Iron
-
A majority of survey respondents looking to implement an NAC solution want to reduce malware incidents, control remote access to the network, and enforce endpoint configurations.
-
From smarter criminals to network access protection, IT is going to have its hands full in 2007.
-
By
A look back at this year’s security threats, predictions for 2007, and a low-cost way for any IT organization to protect data that requires no special equipment or software.
-
Significant changes in CA products are worth a look
-
Symantec Corp. is first out of the gate to announce companion products to Microsoft’s updated Exchange Server 2007
-
For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.
-
Options for notification and remediation, as well as NAC integration techniques and technologies.
-
In the second part of our three-part series about network access/admission control, we examine considerations when testing the health of endpoint devices
-
UTMs are effective for the perimeter, but when it comes to remote offices, don’t shirk the rest of your security needs.
-
By
From zero-hour protection to safeguarding mobile devices, we explore what security functions you can outsource and the characteristics of companies that do so
-
Increasingly, hackers have infiltrated "protected" enterprise networks. One NAC provider says the key to maximizing your protection is to know what’s on your network.