July 30, 2012
While the town of Brick on the New Jersey shore maintains a 1950s aura, with the growth of digital media, its public school system had to alleviate engorged traffic on its network, while safeguarding data.
July 13, 2012
The challenge that Big Data presents is trying to align disparate analytical islands. The answer comes in pulling all the pieces together.
July 02, 2012
Firewalls have been an enterprise security mainstay for years. But with a majority of attacks now being launched against the web application layer of the stack, the technology must evolve.
April 02, 2012
This month, we look at security information and event management (SIEM) tools.
Sony has restored its PlayStation Network (PSN), more than three weeks after service was crippled by a breach that resulted in the theft of personal information belonging to tens of millions of users.
Investigation into the breach of the Sony's PlayStation Network and Qriocity services has turned up further compromise, the company announced Monday.
August 03, 2010
CISOs need to provide safe and efficient means to establish and enforce controls over documents, facilitating collaboration with others beyond the organization.
May 27, 2010
Organizations need not overlook security at their satellite office locations, which may be lacking in on-site IT security expertise.
April 27, 2010
If CSOs only have budget to make one technology purchase, they should consider a firewall upgrade.
Firewalls are again becoming talk of the town. There are an enormous amount of opinions including claims of a recent firewall revolution that have been proposed to completely change the firewall landscape. I will be the first to admit that the features and capabilities offered in today's firewall products are not the same as was offered in their original incarnation. But then again, traffic patterns and applications are not the same as they were when firewalls first hit the market.
March 30, 2010
Automation can help push forward enterprise projects, such as converging physical and IT properties.
A new report says web application firewalls and intrusion prevention systems are necessary technologies for many businesses, but intrusion detection systems and network behavior anomaly detection technologies are declining in popularity.
IT security professionals might think of auditing as a pain, but some are actually cheating to get audits passed, according to a study released Wednesday.
Two reports released this week confirmed the tidal shift in the type of websites into which cybercriminals are injecting malware.
A new torrent of spam, disguised as a message from package carrier DHL, is making its way into inboxes.
March 23, 2009
Strong security is all about reducing the attack surface available to hackers and malicious users.
An unprecedented health care common security framework seeks to raise patient trust, while enabling organizations to more effectively meet compliance mandates -- especially as they move toward electronic records.
February 12, 2009
When security needs are stated in terms of achieving a compliance requirement, management is far more likely to listen.
September 10, 2008
With the right kinds of firewall management technology in place, companies can clean their firewall rules and policies, ease the network administrator's job, boost firewall performance and eliminate security holes.