dcsimg

Drew Robb - Article Archives - Page 8

Catching Enterprise Mobility Management Wave

May 22, 2015
While mobile device management was once all the rage, enterprises are moving to enterprise mobility management as their mobile strategies become more essential to their business.
READ MORE

10 Tips to Mitigate Data Breaches

March 16, 2015
We include a list of vendors that offer solutions that can help improve your response to security threats and data breaches.
READ MORE

Cyber Security's Big Data Problem

December 3, 2014
Big Data has rendered older security models largely obsolete. The all-in-one product approach that once served the industry well is now inadequate.
READ MORE

Whitelisting: Why and How It Works

September 24, 2014
Bad guys continually tweak malware, making it tough for traditional antivirus products to keep up. Whitelisting can help, by allowing only pre-approved applications.
READ MORE

Security Compliance Primer and Buying Guide

June 27, 2014
Security compliance is a complex and sometimes onerous task. Here we offer advice on best practices that can help, along with a guide to available tools.
READ MORE

HR a Hot Target for Cybercriminals

June 3, 2014
Hackers see HR as an easy – and valuable – target. Educating HR staff is a key defense.
READ MORE

Buying Guide: Big Data Apps for Security

February 3, 2014
A growing number of vendors are offering Big Data-driven security solutions that can help prevent data breaches before they happen. We look at four such solutions.
READ MORE

How to Bake Better Security into Applications

October 17, 2013
Mobile and cloud-based apps create new vulnerabilities, which makes it more important than ever for developers to make their code more secure.
READ MORE

How to Secure Mobile Devices

June 14, 2011
The popularity of mobile devices is creating real security headaches for IT organizations.
READ MORE

SaaS and Security: Is Your Data Safe?

April 28, 2008
Software-as-a-Service applications offer big benefits to small businesses, but is it safe to place your company data in someone else's hands? Here's what you need to know.
READ MORE

Feel Vulnerable? Time for Vulnerability Management Tools

March 20, 2008
To combat evolving network security threats, the industry turns its attention to vulnerability management.
READ MORE

Top 10 Security Trends

February 11, 2008
Remember when your biggest fear was a virus outbreak? The latest round of threats will make CISO's positively nostalgic for those simpler times.
READ MORE

Code Green Brings Data Loss Prevention to SMBs

October 19, 2007
Large corporations aren’t the only ones with information worth stealing. Small businesses can also prevent sensitive data from escaping with new appliances from Code Green Networks.
READ MORE

Secure Your Email with Encryption

August 23, 2007
Who's reading your emails? Only those you deem worthy, provided that you adopt an encryption platform that suits (and protects) your business.
READ MORE

Getting the NAC of Security

August 8, 2007
Network Access Control adds yet another layer of technology to the security labyrinth – but some SMBs really need it.
READ MORE

New HIPS Technology Takes on Zero-Day Attacks

February 1, 2006
Some industry watchers say host-based intrusion detection systems may take the lead in battling zero-day attacks.
READ MORE

How to Improve on Wireless Security

January 10, 2006
If you're looking to secure an enterprise WLAN, many industry observers are pointing IT managers to WPA2.
READ MORE

Tales from "De Crypt"

November 16, 2005
Few things get the vultures circling like news of a security breach. A look at how one company assures confidentiality by encrypting all of the data that touches its SAN.
READ MORE

The Incredibly Shrinking Backup Window

October 19, 2005
Data Domain aims to reduce backup times by up to 20x, and prods tape loyalists to ''move on''.
READ MORE