Policy Based Management

Best NAC & Best Policy Management

By

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.

Managing becomes more complex

Managing becomes more complex

By

The risk environment is becoming more complicated as time goes on and criminals become more and more sophisticated.

Private equity firm Thoma Bravo buys LANDesk

By

A private equity firm has acquired LANDesk Software, maker of enterprise IT management solutions, the two companies announced Monday.

Birds of a slightly different feather

Birds of a slightly different feather

By

When the stakes are as high as they are today, relative to protecting organizational information and data, having risk and policy management capability is worth a lot, says Peter Stephenson.

FTC working on new privacy guidelines

By

By the end of the summer, the FTC hopes to release a set of "guiding principles" outlining how businesses should handle certain privacy issues.

Let's get back to reality

Let's get back to reality

Reality sets in not longer after taking an information security job, as step two of this author's "Five Stages of Employment" series continues.

Securing the network fabric versus the perimeter

Securing the network fabric versus the perimeter

With regards to network security and setting perimeters, what constitutes legitimate network activity?

Nearly half of IT security budgets deemed insufficient

By

It's no news that the current economic situation has put a strain on companies' finances, but a recent survey aimed to quantify the toll the recession has taken on IT budgets.

Policymakers debate White House's role in cybersecurity

By

Lawmakers and public policy experts clashed Tuesday over whether cybersecurity control should be taken away from the Department of Homeland Security (DHS) and placed under the White House's purview.

RSA: Ramifications of converging physical and IT security

By

Companies should consider merging physical and information security into a converged program -- it might be challenging but it will be worth it.

Lumension takes Securityworks

By

Endpoint security solutions vendor Lumension announced on Monday its acquisition of Securityworks, an IT security, risk and compliance solutions vendor. The acquisition will enable Lumension to help organizations improve their overall security and risk posture, optimize IT resources, increase operational efficiency and reduce the cost and complexity of demonstrating compliance the company said in a news release. The IT governance, risk management and compliance (GRC) software market is expected to grow from $590 million in 2006 to $1.3 billion by 2011, according to Forrester Research. — AM

Despite downturn, IT security spending to increase

By

Management increasingly is recognizing security as a top business priority, which is resulting in higher budgets for some organizations despite the economic slowdown, according to a new survey.

FTC site helps meeting "Red Flags Rule"

By

The FTC has established a how-to guide for coping with new requirements aimed at deterring identity theft.

Los Alamos computers go missing

By

At least 69 computers are missing from the Los Alamos National Laboratory, a national security research institution in New Mexico.

Medical data leakage rampant on P2P networks

By

The risk of patient information disclosures on peer-to-peer networks is much higher than if a health care worker loses a laptop or removable storage device, according to new Dartmouth College research.

NIST releases draft guidelines for FISMA compliance

By

The National Institute of Standards and Technology (NIST) on Thursday released new guidelines to help federal agencies comply with the Federal Information Security Management Act (FISMA).

Removing admin rights can stem Microsoft exploits

By

Eliminating administrator rights -- the default setting on most Windows machines -- can stop the spread of malware, a new study has found.

To Facebook or not to Facebook?

By

More than half the respondents of a recent poll said their organization does not have a policy on using Facebook.

Analyst firm expects security budgets to rise in 2009

By

Despite the ongoing financial crisis, IT security spending is expected to grow this year, according to two reports from Forrester.

Public and private sectors join in cyberattack simulation

By

A simulation this week demonstrated the need for better collaboration among public and private security groups.

In cybersecurity, who is the weakest link?

In cybersecurity, who is the weakest link?

Human error is the primary cause of information technology security breaches because, too often, individuals are given the option to bypass security processes.

IT security policy enforcement struggles

Companies are struggling to come to grips with the basics of vulnerability management.

Sign up to our newsletters

POLL