Suddenly, you're faced with yet another intrusion, attack, abuse, virus or worm. Who should you call? What will you do immediately and long-term? Will your company even know it's been violated?
Internet security is not just a network problem.
Enterprise managers, your end users are teenagers now; they’re running amok and defying authority simply because they can. They’re doing it subtly by playing on the Internet and by obscuring their non-business use of your systems, and aggressively by destroying property when disgruntled. Ignoring these threats from within will only encourage them.
Is PKI all what it's cracked up to be?
Rigorous security and high cost of ownership have kept mainframes safe from hackers. But as they become key players in e-business, mainframes could be at risk.
In the days before desktops, when IT was MIS and the words computer and mainframe were synonymous, non-MIS employees weren't supposed to understand, let alone attempt to learn about, anything digital. They weren't supposed to ask, and MIS wasn't supposed to tell.
Firewalls are evolving to accommodate today's sprawling enterprise systems. Several types of products can enhance your security and peace of mind.
Reaching out to as many customers as possible means corporate e-business strategies need to consider strategic approaches to e-security as well.
Just as explorers introduced disease to previously isolated populations, opening up corporate systems has added a slew of challenges. Although security policies were originally designed to keep unwanted intruders out, they now must also let the right people in, and do it as quickly and seamlessly as possible.
Jim Craft is on a quest to secure information.
Make no mistake: Moving applications onto the Web merely makes disaster recovery planning even more critical.
How long will write-once-read-many (WORM) technology last? Up to now, this technology simply hasn't been around long enough to even take a stab at answering this question based on realtime testing. However, recently the maturity of optical WORM technology reached the point where it has finally become possible to test media that was written a considerable period of time in the past. The results indicate that TrueWORM media should have no difficulty lasting the 100 years or so that has been projected in the accelerated aging tests.
With the evolution of network management, more responsibility has been placed upon the "framework" to fulfill the TMN FCAPS model. Typical network operations centers, which support Simple Network Management Protocol (SNMP)-based logical and physical devices, must now be capable of supporting all business units in a uniform fashion.
Java development efforts are sweeping through the enterprise. Existing legacy applications are being reengineered to include Web front-ends. E-business is an idea whose time has come. This article introduces an Object-Oriented Project Size Estimation technique that can help predict the amount of time it takes to design, code and test an object-oriented project.
The creation of an information security policy can be a complex task. Decisions need to be made concerning the degree and type of security that is right for your company, while considering economic factors. Where do you begin?
With companies scrambling to gain yardage on the e-business playing field, data security and integrity could mean the difference between a win and a loss. Secure extranets redefine security from a defensive measure to a strategic, offensive move which allows companies to truly enable their online businesses.
Companies turn to Schumann Security Software's Security Administration Manager to build a repository of "who has access to what."
Today’s trend toward enterprisewide information sharing has network administrators scrambling to “build a better mousetrap.” This solution presents blueprints for building a seven-layer security system within your own network neighborhood.