dcsimg

Articles by Allen Bernard 

Holding ISVs Accountable

With an ever increasing tide of security breeches and ensuing publicity, companies are starting to hold their software vendors accountable.

Security Suites Get Graded

The complexity of malicious code infiltrating corporate networks has rendered simple security tools inadequate.

The Pros & Cons of Managed Security

Managed security outsourcing is a multibillion-dollar business with companies of all stripes saving money by offloading time-consuming and mundane security tasks to providers. But there's more at stake than saving a few bucks.

Network Security Top Priority in 2005

Facing an ever-growing array of threats to corporate information systems, technology executives now see enhancing network security as 'Job One'.

WiFi Security Concerns Easing

For corporate deployment of WiFi networks, security has been the biggest hurdle to overcome and one of WiFi's biggest cons. Today, all that has changed.

Soft on the Inside

While external security threats abound, most serious risks still emanate from lax policies and procedures and a lack of ongoing employee training.

Report Raps Cisco's Security

Cisco is improving security features but complex network management is still problematic and other vendor's products are far superior.

Under the Radar: IM Emerging as a Stealth Threat

Instant messaging has moved out of your kid's bedroom and into the office next door. And this could spell trouble for your network security administrator. First, though, they have to know it's there -- and many don't.

The Pros & Cons of Ethical Hacking

The use of ethical hackers to test for security vulnerabilities is as old as the IT hills. But, unless there are clear goals outlining why and to what extent your organization is engaging them, the outcome could be useless information -- or worse.

The Pros & Cons of Ethical Hacking

The use of ethical hackers to test for security vulnerabilities is as old as the IT hills. But, unless there are clear goals outlining why and to what extent your organization is engaging them, the outcome could be useless information -- or worse.

IT Spending To Rebound

IT spending is expected to increase in '04 — Web services, security, and wireless should benefit.

Spammers Becoming More Brazen

Spammers are using virus-like methods to avoid blacklisting and get their messages into as many email in-boxes as possible in the shortest amount of time.

WS Security and Adoption

Without security standards, the promise of Web services as a firewall-crossing business tool will remain elusive at best. The good news is the first steps along this road have already been taken.

Case Study: University Turns to ReefEdge for WLAN Security

When California Lutheran University recently installed a wireless LAN connecting a dozen campus buildings, it needed a cost-effective security system. The university's tech pros tapped wireless network infrastructure vendor ReefEdge Inc.'s Connect System.

ASPs Help Fight Terrorism

When it comes to quickly deploying information-sharing applications, the ASP model offers capabilities that are being implemented by many organizations to track possible terrorist activity.