Astaro, a specialist in Linux-driven integrated security, has rolled out a product touted as the first on any operating system to combine network firewall protection with an anti-spyware gateway.
Concerned about the security of your Linux environment or looking for ways to beef up your existing security? Two Linux security pros share tips to help you get up to speed on the latest Linux security advancements.
Enterprises and network administrators are starting to face an increasing number of new remote access and management scenarios beyond the ever-present need to secure corporate laptops at public hotspots.
A couple of years from now, will you still be relying on the same anti-spam strategy you're using today? Jacqueline Emigh takes a look at the anti-spam scene as it stands today and reveals where it appears to be headed in the near future.
The onslaught of spam is spawning a growing spate of solutions, but which approach to fighting spam is best for your organization? Join Jacqueline Emigh as she reveals the pros and cons of the various host-based services, hardware appliances, and software gateways currently available for combating spam.
The onslaught of spam is spawning a growing spate of solutions. Join Jacqueline Emigh as she delves into the issue of how spam proliferates so quickly, and why it's driving administrators to deploy anti-spam products in droves.
About three weeks from now, Matrix NetSystems and a still unnamed partner will launch a global Internet 'early warning system' aimed at alerting customers to cyberattacks in plenty of time to fend off damage. Meanwhile, Jacqueline Emigh reports the new Internet management service provider has just inked a deal with netVmg, developer of a solution for routing traffic across ISP links according to specified enterprise policies.
Jacqueline Emigh undresses the sexy part of the computer security world in tackling the somewhat ambiguous term 'Digital Forensics.'
Lotus' latest Notes and Domino release boosts spam-fighting and security measures including smartcard support and mail encryption. Jacqueline Emigh covers what's new.
Intrusion detection systems provide reams of raw data, and plenty of false alarms. How do you assess an IDS, where do you use one, and when does a human need to step in and make sense of what it's telling you?
Gummy fingerprints aside, biometric security has its share of potential issues, including end-user resistance to potential privacy threats and methods that seem invasive.
Some studies show nearly half of surveyed IT executives have no formal security policy in place. Why are many in the industry running in place when it comes to security?
While the Federal government pushes companies to share information on security practices and incidents, some in the private sector are unsure of the benefits and nervous about disclosure requirements.
With wireless hubs an entry point for enterprise security risks, it's imperative to adopt policies and security measures that limit the chances your network will be compromised.
The Center for Internet Security hopes to ease enterprise policy compliance with a new suite of security benchmarks that brings cut-and-paste simplicity to network device configuration.
Try as you might, you just can't stop users from opening virus-ridden e-mail attachments, or compromising security in other ways. What to do about it?
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?