-
Video: The foundation of an email security strategy
Guest instructor Joel Snyder explains which standards can help you increase the security of SMTP-based email.30 Nov 2008
-
Host-based intrusion prevention addresses server, desktop security
HIPS is used for everything from traditional signature-based antivirus/antispyware and host firewalls to behavior analysis.28 Nov 2008
-
Product Review: Shavlik's NetChk Compliance
Shavlik's NetChk Compliance automates compliance and provides control by actively managing system and security settings and allows the IT manager to identify and mitigate risks.28 Nov 2008
-
TrueCrypt an open source laptop encryption choice for SMBs
TrueCrypt eases security and privacy concerns. The open source security software encrypts a dedicated space on your hard drive, a partition or the whole disk, as well as removable storage devices.28 Nov 2008
-
Layoffs, Mergers Put Focus on Data Protection
As banks fold, or are acquired, companies need to be vigilant about access controls and provisioning.28 Nov 2008
-
Product Review: Symark PowerADvantage 1.5
Symark's Symark PowerADvantage allows Unix hosts to become member servers of an AD forest and leverage AD's centralized user management and authentication capabilities.28 Nov 2008
-
Interview: Former L0pht hacker and current Grand Idea Studio owner Joe Grand
Known as a hardware security wizard, Grand is now a sought-after trainer and one of the hosts of a new show on Discovery Channel called Prototype This! about building unusual projects on a tight bu...28 Nov 2008
-
Poor development practices lead to continued security problems
Critical systems continue to fail because security specialists haven't established themselves as valuable professionals.28 Nov 2008
-
Collaboration with auditors will benefit information security programs
Security professionals should appreciate their relationships with internal auditors, who by pointing out security areas that need improvement, head off failures with external auditors.28 Nov 2008
-
Security services: Fiberlink's MaaS360 Mobility Platform
The MaaS360 Mobility Platform service handles remote device updates, such as OS patches.28 Nov 2008
-
Using a managed file transfer for secure data transmission, exchange
Managed file transfer (MFT) products meet the increasing security, compliance and operational demands of data in motion.28 Nov 2008
-
Maintaining a strong security program during a recession, layoffs
Learn to maintain security during tough economic times and budget cuts when big corporations such as Merrill lynch, Wachovia and Chase, B of A are doing layoffs.28 Nov 2008
-
Security researchers leading way in biometrics, insider threats, encryption and virtualization
Carnegie Mellon University's CyLab is blazing trails in biometrics, insider threats, key exchange, virtualization and more.28 Nov 2008
-
Product Review: GuardianEdge Data Protection Platform
The GuardianEdge Data Protection Platform addresses the challenge of securing data wherever it resides, with centrally managed security on computers, mobile devices and portable storage.28 Nov 2008
-
Diverse mobile devices changing security paradigm
Enterprises must develop more creative strategies for enabling business use of smartphones and PDAs, including those that cannot be fully managed and secured.28 Nov 2008
-
Product Review: Deepdive's DD300
Deepdive's DD300 appliance helps you identify and discover data on your network.28 Nov 2008
-
Free security tool helps track down bots
BotHunter, a free tool that monitors traffic flows between infected hosts and external attackers helps organizations track down infected hosts and battle botnets in their network.26 Nov 2008
-
Web app attacks grow, but developers may fight back
Web application security expert Ryan Barnett would like to see every company use a Web application firewall. But Barnett, director of security at Web application firewall vendor Breach Security Inc...26 Nov 2008
-
How to create a policy to avoid disgruntled employee data leaks
When crafting a data security policy, take into account that disgruntled employees may leak data. Learn how to prevent employee data leakage, and how to handle data loss if it occurs.26 Nov 2008
-
Screencast: Collecting metadata with Metagoofil
Peter Giannoulis explains how Metagoofil, an information gatherer that extracts metadata from public documents, can be extremely valuable when investigating a target network.25 Nov 2008
Security Management Strategies for the CIO