Allen Bernard - Article Archives - Page 1

Holding ISVs Accountable

November 29, 2005
With an ever increasing tide of security breeches and ensuing publicity, companies are starting to hold their software vendors accountable.
READ MORE

Security Suites Get Graded

August 19, 2005
The complexity of malicious code infiltrating corporate networks has rendered simple security tools inadequate.
READ MORE

The Pros & Cons of Managed Security

April 20, 2005
Managed security outsourcing is a multibillion-dollar business with companies of all stripes saving money by offloading time-consuming and mundane security tasks to providers. But there's more at stake than saving a few bucks.
READ MORE

Network Security Top Priority in 2005

February 25, 2005
Facing an ever-growing array of threats to corporate information systems, technology executives now see enhancing network security as 'Job One'.
READ MORE

WiFi Security Concerns Easing

November 3, 2004
For corporate deployment of WiFi networks, security has been the biggest hurdle to overcome and one of WiFi's biggest cons. Today, all that has changed.
READ MORE

Soft on the Inside

June 25, 2004
While external security threats abound, most serious risks still emanate from lax policies and procedures and a lack of ongoing employee training.
READ MORE

Report Raps Cisco's Security

May 12, 2004
Cisco is improving security features but complex network management is still problematic and other vendor's products are far superior.
READ MORE

Under the Radar: IM Emerging as a Stealth Threat

May 6, 2004
Instant messaging has moved out of your kid's bedroom and into the office next door. And this could spell trouble for your network security administrator. First, though, they have to know it's there -- and many don't.
READ MORE

The Pros & Cons of Ethical Hacking

February 2, 2004
The use of ethical hackers to test for security vulnerabilities is as old as the IT hills. But, unless there are clear goals outlining why and to what extent your organization is engaging them, the outcome could be useless information -- or worse.
READ MORE

The Pros & Cons of Ethical Hacking

January 23, 2004
The use of ethical hackers to test for security vulnerabilities is as old as the IT hills. But, unless there are clear goals outlining why and to what extent your organization is engaging them, the outcome could be useless information -- or worse.
READ MORE

IT Spending To Rebound

November 11, 2003
IT spending is expected to increase in '04 — Web services, security, and wireless should benefit.
READ MORE

Spammers Becoming More Brazen

October 16, 2003
Spammers are using virus-like methods to avoid blacklisting and get their messages into as many email in-boxes as possible in the shortest amount of time.
READ MORE

WS Security and Adoption

August 15, 2003
Without security standards, the promise of Web services as a firewall-crossing business tool will remain elusive at best. The good news is the first steps along this road have already been taken.
READ MORE

Case Study: University Turns to ReefEdge for WLAN Security

May 2, 2003
When California Lutheran University recently installed a wireless LAN connecting a dozen campus buildings, it needed a cost-effective security system. The university's tech pros tapped wireless network infrastructure vendor ReefEdge Inc.'s Connect System.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|