Email Alerts
-
McAfee to acquire Solidcore Systems for whitelisting
The $47 million deal adds Solidcore's whitelisting technology to McAfee's product line up. Article | 15 May 2009
-
Misconfiguration issues could have contributed to Hannaford breach
Hannaford takes heat from officials who believe the supermarket chain was slow in disclosing its breach. Meanwhile, one of Hannaford's security vendors gets defensive. Article | 19 Mar 2008
-
Misconfigured networks create huge security risks
Security experts say IT pros should be more concerned about the risks created by misconfigured networks than all the flaws and exploit code they read about. Article | 05 Mar 2008
-
Private sector should learn from government insecurity
The State Department hearings drew attention to the serious security problems that plague government networks. Federal security improvements will help push private sector progress. Column | 26 Apr 2007
-
Compliance drives security configuration management
IT operations is turning to software that monitors security configurations across the enterprise to meet a number of regulations. Article | 25 Apr 2007
-
Standalone patch management vendors under siege
McAfee's acquisition of Citidel this week demonstrates that the patch-management niche may be one of the more active battlegrounds for larger vendors with deep pockets. Article | 05 Oct 2006
-
Change control helps IT deal with changing threats
Solidcore S3 Control takes a fresh approach to security by helping administrators control and prevent changes to their network infrastructure. Article | 21 Sep 2006
-
Subpar signatures embolden call for antivirus SLAs
With antivirus signature quality becoming an increasingly troublesome problem for businesses, the industry says SLAs are needed to hold vendors accountable when things go wrong. Article | 22 Jun 2006
-
Survey: Vista security skepticism swells
More than half of those who answered a recent survey say they have no current plans to deploy the upcoming Windows Vista OS. Article | 01 Jun 2006
-
Security Blog Log: A week of vulnerabilities
This week the blogosphere focused on some significant security holes in Internet Explorer, Windows and Sun's Java Runtime Environment. Column | 10 Feb 2006
Security Management Strategies for the CIO