Email Alerts
-
Video: Telecom carriers bolster security services
Kerry Bailey of Verizon and Stan Quintana of AT&T explain their companies' expanding role as security service providers, now and in the near future. Article
-
Webroot adds email security with SaaS acquisition
Webroot adds email archiving, encryption and Web filtering with the acquisition of UK-based Email Systems. Article
-
Mitigating Web 2.0 threats
As companies look to cut costs, Software as a Service has gained ground in the enterprise. Similarly, social networking sites like Facebook and LinkedIn are must-haves in today's workplace. David Sherry reviews how to secure these services and defend... partOfGuideSeries
-
SaaS offering a first for Symantec
Symantec has launched a beta of the Protection Network, a software-as-a-service platform for small-to-medium-sized businesses. Resellers will be able to offer customized versions. Article
-
Security Blog Log: Apple lives under 'cloud of smug'
This week, Apple is accused of security hubris for falsely boasting that malware isn't a problem for Macs. Meanwhile, in fall malware fashion, worms are out and bots are in. Column
-
How to create shared services that two different parties can use
To mitigate a problem common to educational facilities, the student hacker, network security expert Mike Chapple suggests isolating student and administrative networks or creating shared services that both parties can use. Learn how to accomplish thi... Ask the Expert
-
Service-level agreement advantages and disadvantages
Learn about the advantages and disadvantages of service-level agreements. Tip
-
Grid computing now focused on security, compliance
The Enterprise Grid Alliance touts the benefits of enterprise grid computing and addresses security benefits and concerns in a new document. Article
-
Firms to seek more security help from outsiders
A new report from Yankee Group says enterprises will outsource 90% of their security by 2010. Article
-
How much info should an ASP give potential customers about its security policies?
Ask the Expert
Security Management Strategies for the CIO