Sleeping laptops may be the next way hackers steal encrypted information
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    We’ve all attached a file to an e-mail, but enterprises need a way to transfer large files securely.  To explain the requirements, approaches, and options, we spoke with Ellen Ohlenbusch at GlobalSCAPE
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    ID theft usually involves time-tested methods such as telephone fraud than blockbuster data breaches
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The number of new vulnerabilities disclosed by researchers actually declined in 2007 -- the first time that’s happened since 2003 -- but it’s not all good news.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In an age of Sarbanes-Oxley and similar regulatory measures, how could a single rogue trader have racked up more than $7 billion in losses?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    After you’ve protected your environment from outside threats such as viruses, it’s time to turn your attention inward and protect against threats from your employees themselves.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Why organizations need to get serious about security awareness training
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    With mobile security, the devil you don’t know can hurt you much more than the devil you think you know
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    It's time to finally get serious about locking down IM
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Multiple, overlapping, and mutually supportive defensive systems and patched, up-to-date systems can help consumers and businesses take advantage of the Internet while avoiding its dangers.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    It’s been a tough year for protecting the enterprise.  We review a security expert’s predictions for 2007, explore what’s been driving the rash of new vulnerabilities, and look ahead with him to the security problems that will dominate 2008.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Will it be "same old, same old" in security for 2008?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A new report from the IT Policy Compliance Group examined leaders and laggards to identify core competencies and steps to improve data protection.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Compliance applies to the entire infrastructure, even the many  crannies of heterogeneous environments.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Industry standards and trusted hardware keep out unauthorized users and equipment
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In the second of three parts, unifying security, compliance, and risk assessment get better results
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In this first part of a three-part series, we look at how compliance continues to change IT security and response to risk
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Can products such as Lancope’s Stealthflow spot security problems and network bottlenecks?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Security information and event management (SIEM) can help administrators track security data in a networked environment and counter potential threats. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New versions more about people than features.