-
Secure cloud file storage for health care: How to regain control
Should health care organizations endorse the use of secure cloud file storage? Michael Cobb offers advice on establishing governance processes for cloud-based services.28 Feb 2011
-
RSA Conference 2011: News, interviews and updates
The RSA Conference is a valuable resource in staying educated on the latest advances, threats and emerging trends in the information security industry.28 Feb 2011
-
Data loss prevention best practices start with slow, incremental rollouts
Early adopters of DLP deployments say slow, incremental rollouts help reduce the burden on IT staff and the potential for chaos among business units.28 Feb 2011
-
Social networking best practices for preventing social network malware
Get advice on social networking security best practices that can help prevent data leaks and other social network malware that could harm to your enterprise.28 Feb 2011
-
Valuable third-party patch deployment software, tools
Do you know some of the best third-party patch deployment tools? See expert Michael Cobb's recommendations on which tools would work best for your enterprise.28 Feb 2011
-
Google 'Gchat' security and Internet application security best practices
Users in the enterprise may unknowingly be exposed to 'Gchat' security risks. Expert Michael Cobb discusses Internet application security best practices that can help protect enterprise users.28 Feb 2011
-
The state of enterprise spam filters: Can more be done to control spam?
Does your enterprise rely solely on its email filter to protect against spam? Are you aware of how spam filters work? Expert Michael Cobb discusses how today's spam works, and what can help control...28 Feb 2011
-
Guidance on dual-homed server security
Learn more about how a dual-homed server operates, and what security restrictions it entails in this expert response from Anand Sastry.25 Feb 2011
-
Do gigabyte converter and SPF records present a security threat?
Do gigabyte interface converters or sender policy framework transceivers retain any of the information that passes through them? Network security expert Anand Sastry explains.25 Feb 2011
-
How to create a secure conference room with a WLC/NAC configuration
Conference rooms are often hosts to corporate-owned and guest devices, so what 's the best secure authentication setup? Security pro Anand Sastry weighs in.25 Feb 2011
-
Microsoft's Scott Charney on fighting botnets, rogue antimalware
In the final segment of SearchSecurity.com's exclusive RSA Conference 2011 video interview with Scott Charney, Microsoft's Corporate VP of Trustworthy Computing, he discusses a variety of concerns ...25 Feb 2011
-
Security/virtualization concerns: Where to place a firewall connection
Is it worthwhile to place signature-based blocking technology before a firewall connection? Learn more in this expert response from Anand Sastry.25 Feb 2011
-
How to monitor network traffic: Appliance placement and choke points
Monitoring network traffic is crucial, but where's the best place to put network monitoring tools? Expert Anand Sastry gives advice.25 Feb 2011
-
McAfee survey confirms compliance as key driver for IT security
A survey of more than 300 IT professionals found that 25% of IT projects begin as part of compliance initiatives.24 Feb 2011
-
Microsoft fixes Security Essentials, Forefront products bug
A Microsoft security advisory alerts users that an automatic update will repair a flaw in the Malware Protection Engine used across all of its antimalware products.24 Feb 2011
-
RSA Conference 2011 recap: What we learned
Senior Site Editor Eric B. Parizo offers a brief recap of his top themes from RSA Conference 2011.24 Feb 2011
-
Looming IPv6 transition will strain federal cybersecurity
The heat is on federal agencies to transition to Internet Protocol version 6 (IPv6) within the next 18 months as IPv4 address exhaustion approaches.23 Feb 2011
-
CISO interview: Choosing enterprise risk management policy
In this video interview from RSA Conference 2011, CISO Scott Sysol discusses his organization's enterprise risk management policy on various emerging technologies.23 Feb 2011
-
Q&A: The state of the Microsoft Trustworthy Computing initiative in 2011
In this exclusive video interview from RSA Conference 2011, Microsoft Corporate Vice President of Trustworthy Computing Scott Charney and SearchSecurity.com Senior Site Editor Eric B. Parizo discus...23 Feb 2011
-
New OddJob banking Trojan keeps users logged in while draining accounts
Security researchers at Trusteer warn that a new Trojan uses session ID tokens to keep banking sessions open long after customers think they have logged off.22 Feb 2011
Security Management Strategies for the CIO