Home
 > search for

Featured Documents related to »  security article


Outsourcing Security Part 3: Selecting a Managed Security Services Provider
As the final article in a three-part series on outsourcing security, the following article provides guidelines for selecting a dependable managed security

security article  management of their information security are understandably wary. Gartner predicts that more MSSP organizations will fail, and numerous mergers and acquisitions will take place before the market settles. For this reason, it is imperative that organizations take precautions to thoroughly analyze potential MSS vendors. As the final article in a three-part series on outsourcing security, the following article provides guidelines for selecting a dependable managed security services provider. This is Part 3 Read More
Information Security Selection
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » security article


Security Breach: Now What?
When people's lives or financial transactions are at risk, proper Security Incident handling is of extreme importance.

security article  Problem With so many security incidents occurring, many IT decision makers are unclear as to who they should notify, and what steps they should take if their network or systems are breached. There is a good chance that local and Federal law enforcement agencies will likely not be skilled enough to conduct a proper investigation. Is there anyone else you should notify? Where do you begin and what should you look for? Enlisting the Process and Reporting Every organization should have a process for dealing Read More
New Market for Security Insurance
Some insurance companies are now offering policies which protect companies against system, network, and website security losses. What do these policies offer

security article  Market for Security Insurance Event Summary In light of the heightened exposure various companies are facing regarding website, network, and system security compromises, insurance brokers are jumping on the bandwagon, offering customized Security Insurance Polices that protect companies with information technology infrastructures against numerous risks not covered by their required standard corporate General Liability Insurance Policy. Some of the kinds of protections these policies cover are: Loss due Read More
Security Risk Assessment and Management in Web Application Security
Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk

security article  Management in Web Application Security Originally published January 27, 2006 Security risk assessment and security risk management have become vital tasks for security officers and IT managers. Corporations face increased levels of risk almost daily from software vulnerabilities hidden in their business-technology systems to hackers and cyber crooks trying to steal proprietary corporate intellectual property, including sensitive customer information. An ever-growing list of government regulations aimed Read More
Security Stocks Burn Rubber
Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and

security article  Stocks Burn Rubber Security Stocks Burn Rubber L. Taylor - April 27th, 2000 Event Summary On February 9th, there was a fury of Distributed Denial of Service attacks that rocked the cyberworld. In response to this attack, numerous security technology corporations are seeing rapid marketcap growth. Market Impact Internet Security Systems (NASDAQ: ISSX), an Atlanta based Internet security vendor, specializes in providing leading security management solutions for the cyberworld. In January of this Read More
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Read this white paper to find out all of

security article  DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Read this white paper to find out all of the scary details about these attacks and what you can do to prevent them. Read More
Developing a Security-oriented Corporate Culture
JurInnov’s director of information systems and security provides a detailed analysis of why development of a security-oriented corporate culture is imperative

security article  of information systems and security provides a detailed analysis of why development of a security-oriented corporate culture is imperative for companies wishing to keep their electronically stored information secure. Read More
Spire Security
Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise

security article  Security Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics. Read More
Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance
Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security

security article  Microsoft Create New PC Security Alliance Event Summary On Monday, October 11, Compaq, Hewlett Packard, IBM, Intel and Microsoft announced the launch of a new alliance, the Trusted Computing Platform Alliance . The Alliance has chartered itself with the mission of developing a new hardware and software specification to enable technology companies to use a more trusted and secure personal computer platform based on common standards. Alliance Chairman, David Chan of Hewlett-Packard says, This workgroup Read More
TCO & Security of Enterprise Grade Mobility
While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read

security article  & Security of Enterprise Grade Mobility While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read this research with IT decision makers from the various departments across the UK public sector to understand the challenges they are encountering in the face of compliance, control, cost, and consumerization, and to gain best-practice lessons in mobile enterprise management. Read More
Internet Security and Acceleration Server
Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet

security article  Security and Acceleration Server Microsoft Internet Security and Acceleration (ISA) Server is a multilayer enterprise firewall and Web cache that helps provide secure and fast Internet connectivity. Microsoft intends its ISA Server to be optimized for application-layer defense, networking on a virtual private network (VPN), stateful packet inspection, and secure publishing. ISA Server functions as a Web proxy and cache for customers that need to improve performance or save network bandwidth Read More
Enterprise Authentication: Increasing Security without Breaking the Bank
As the number of remote and mobile workers grows, new security practices highlight the need for strong authentication. Today, passwords aren’t enough protection

security article  Authentication: Increasing Security without Breaking the Bank As the number of remote and mobile workers grows, new security practices highlight the need for strong authentication. Today, passwords aren’t enough protection against unauthorized access. How can you increase authentication security while preserving operational and budget efficiency? Learn about the challenges of identity authentication, and the versatile solutions that can help prevent the risk of breaches and attacks. Read More
Understanding the Costs of Email Security
The three main cost factors associated with e-mail filtering solutions are solution costs, operating costs, and productivity losses. This paper aims to help the

security article  the Costs of Email Security The three main cost factors associated with e-mail filtering solutions are solution costs, operating costs, and productivity losses. This paper aims to help the reader make an informed decision when purchasing an e-mail filtering solution by analyzing the various features and properties that contribute to the total cost of ownership. Read More
Web Security: Bullet-Proofing Your Site with SSL
In this security guide from Symantec you'll discover that the best solution can also be the most cost-effective.

security article  especially wi-fi, pose serious security risks, particularly with the advent of Firesheep-style sidejacking attacks. End-to end HTTPS encryption is one surefire solution—but what about the cost? So, what is the best approach you can take to ensure optimal protection? In this security guide from Symantec you'll discover that the best solution can also be the most cost-effective. Get all the facts in Protecting Users from Firesheep and Sidejacking Attacks with SSL . You'll learn about the benefits and Read More
Driving the Need for Highly Effective Mail Server Security
Most companies have already invested in e-mail security. However, yesterday’s defenses may not be up to the challenge of tomorrow’s threats. Why? Because

security article  Highly Effective Mail Server Security Most companies have already invested in e-mail security. However, yesterday’s defenses may not be up to the challenge of tomorrow’s threats. Why? Because Internet security risks are increasingly malicious: Web threats are growing more than 100 percent every six months, and targeted attacks are up 351 percent from two years ago. Re-examine your approach to mail server security and protect yourself from malware attacks. Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others