• December 30, 2010 30 Dec'10

    Best practices: Identity management - Part 2

    Do you know how to optimize your identity management? Learn how In part 2 of Best practices: Identity management where experts Kelly Manthey and Peter Gyurko discuss how using case studies involving a Fortune 500 bank.  Continue Reading

  • December 30, 2010 30 Dec'10

    Best practices: Identity management - Part 1

    In Best practices: Identity management - Part 1, experts Kelly Manthey and Peter Gyurko discuss development, education, strategies involving identity management.  Continue Reading

  • December 29, 2010 29 Dec'10

    Mobile client security

    Develop client security and get information on client security software, how to build, implement and maintain secure procedures, awareness training and assessments for keeping your network safe from potentially unsecure laptops, desktops, and other ...  Continue Reading

  • December 29, 2010 29 Dec'10

    Network Intrusion Prevention (IPS)

    Get advice on how to develop a network intrusion prevention system solution, how to deploy an IPS, such as Snort, and how to choose an IPS.  Continue Reading

  • December 29, 2010 29 Dec'10

    BYOD and mobile device security best practices

    Enhance handheld security in several ways, such as encryption, to prevent hacker attacks, threats, flaws and vulnerabilities on your BlackBerry, iPhone, Bluetooth, Windows, Symbian, Palm and all other mobile devices.  Continue Reading

  • December 29, 2010 29 Dec'10

    Endpoint protection and client security

    Develop client security and get information on client security software, how to build, implement and maintain secure procedures, awareness training and assessments for keeping your network safe from potentially unsecure laptops, desktops, and other ...  Continue Reading

  • December 27, 2010 27 Dec'10

    Enterprise Compliance Management Strategy

    Compliance has become part of the day-to-day operations at many organizations. Learn about the various aspects of managing compliance operations at your company, with news, advice and best practices related to managing compliance teams, handling ...  Continue Reading

  • December 27, 2010 27 Dec'10

    Enterprise Compliance Tools

    As compliance has become a priority for organizations of all sizes, the regulatory compliance software, tools and solutions market has grown to meet the increasing need. Learn more about evaluating compliance software, tools and solutions with news,...  Continue Reading

  • December 27, 2010 27 Dec'10

    Denial of Service (DoS) Attack Prevention

    Get advice on how to secure systems against flaws that can make your organization vulnerable to Denial of Service (DoS) attacks.  Continue Reading

  • December 27, 2010 27 Dec'10

    Smartphone and PDA Viruses and Threats

    In this guide you will get the latest news on smartphone and PDA viruses and threats. Learn how viruses, Trojans, malicious code and worms can infect smartphones, PDAs and mobile devices, such as iPhones and Blackberrys and how to prevent these ...  Continue Reading

  • December 27, 2010 27 Dec'10

    Security Awareness Training and Internal Threats

    Get advice and tips on how end user security and security awareness training can help prevent internal threats. Info is also offered on keystroke loggers, security awareness programs, and how to prevent data leakage  Continue Reading

  • December 27, 2010 27 Dec'10

    What is identity management?

    Do you know what identity management is and how to properly manage it? This expert video featuring Kelly Manthey and Peter Gyurko explores the role of identity mangement and how it can benefit your enterprise.  Continue Reading

  • December 27, 2010 27 Dec'10

    Network Security: Tools, Products, Software

    Strengthen your network defense with security tools, products and software. These resources advise you on how to add and implement components such as perimeter firewalls, as well as what you should know about all-in-one appliances.  Continue Reading

  • December 27, 2010 27 Dec'10

    Identity Management Technology and Strategy

    Here you'll get advice on several identity management technologies, how to develop a strategy, how to avoid costly problems and common mistakes, password and ID management, and identity management tools, software and services.  Continue Reading

  • December 27, 2010 27 Dec'10

    User Authentication Services

    In this guide, get tips and advice on user authentication and authorization methods and services: biometrics, two factor and multifactor authentication, single sign-on (SSO), smartcards, PKI.  Continue Reading

  • December 27, 2010 27 Dec'10

    Network Access Control Basics

    Learn the basics of network access control (NAC) to achieve secure user access and avoid hacker attacks. Get advice on implementation, deployment, endpoint security software and policies.  Continue Reading

  • December 27, 2010 27 Dec'10

    UTM Appliances and Strategies

    Examine the pros and cons of Unified Threat Management (UTM) security appliances and learn whether they can benefit your environment .  Continue Reading

  • December 27, 2010 27 Dec'10

    SSL and TLS VPN Security

    In this Secure Sockets Layer (SSL) VPN and TLS how-to, get advice on using SSL certificates, configuration, server, authentication, security and how to enable SSL.  Continue Reading

  • December 27, 2010 27 Dec'10

    Security Resources

     Continue Reading

  • December 27, 2010 27 Dec'10

    Information Security Jobs and Training

    Information for job-seekers, including salaries for jobs in information security, security training, exam program and courses, career opportunities for women, advancement and promotion strategies plus qualifications for becoming a CSO, CISO or ...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close