Forrester says IT security is in a "renaissance period"
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    How to handle the special security risks posed by portable devices
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A new survey finds that nearly 9 out of 10 IT employees say they'd steal privileged or confidential information if they knew they were going to be laid-off tomorrow.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Results of AberdeenGroup research shed light on best practices in vulnerability management
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    How to protect yourself from the threats posed by unified communications.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Your employees may take the corporate laptop on summer holiday and bring back security risks to your network 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Customers want integrated -- and highly manageable -- security tools. A smorgasbord of best-of-breed tools just can't get it done anymore
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Strong, effective IT security can be compromised by orphaned accounts and entitlements.  We offer strategies to manage these expired accounts and entitlements.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    With the right investigative techniques, experts maintain, fraud-busters can connect the dots, uncover evidence, and combat fraud
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    SQL injection vulnerabilities are easy -- and cheap -- to test for, regardless of whether you're a good guy or a malicious hacker
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Is there a holistic solution for ensuring the secure, fast, and reliable delivery of applications?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A security researcher's speculation about a DNS flaw ignites another firestorm for full and responsible disclosure
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Thanks to this month's DNS vulnerabilities, a lot of patching will be taking the time of DNS administrators.  In fact, it might even seem like 2002 all over again.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Microsoft officials warn of a problem that arises after users apply a DNS patch to Windows XP and 2000.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Enterprise security is an expensive proposition – one that's likely to get even more expensive as organizations take steps to protect themselves.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    As attackers increasingly target browser flaws, the Firefox update scheme serves as a model for the industry
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    From centralization to support for standards, these encryption key management and data security best practices can help you protect your organization’s confidential data and comply with regulatory mandates.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Firewalls and other technologies no longer adequately protect application code.  
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Firefox 3.0 release highlights the perils of information technology celebrity
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    What training do developers need and how do you get executive buy-in?