Enterprise information security management

Email Alerts

Register now to receive SearchCIO.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Microsoft tackles second zero-day threat in a week

    This time, attackers are going after a zero-day flaw in Windows, and Microsoft has released some workarounds until a patch is available. 

  • Secure access and simplicity -- a balancing act that pays off

    Securing $5 billion worth of investment portfolios while allowing easy access for customers and partners are just a few of the challenges investment firm Financial Engines meets -- while keeping up with compliance standards. 

  • IAM deployment snapshot

    Blue Cross and Blue Shield of Kansas City had a list of requirements and projected costs for its identity and access management project. Here's the details. 

  • Mobile device encryption: A best practice that no one uses

    Experts and IT executives agree that mobile device encryption is the best way to protect data. But too few companies are actually deploying this critical technology. 

  • ID and access management: Just say yes

    Implementing an identity and access management system begins with the executive approval process. Joel Dubin offers detailed steps to winning over your CEO and CFO with ROI benchmarks. 

  • IT perplexed by password-protection challenges

    Despite using a plethora of preventive measures, IT managers can't seem to stop users from recording their passwords on Post-It Notes or in their PDAs. Experts say it's like locking your front door and sticking the key to the doorbell. 

  • FBI: Cyberattacks underreported

    Companies should do more to report cybercrimes such as hacking and phishing to help federal authorities investigate and ensure that additional data isn't compromised beyond initial attacks, a high-ranking FBI official said. 

  • Online brokerage account scams worry SEC

    High-tech crooks are hijacking online brokerage accounts by using spyware and operating from remote locations, sometimes in Eastern Europe, U.S. market regulators said on Friday. 

  • Microsoft to give Vista data to security firms

    Microsoft will make available parts of key data to security software firms such as Symantec Corp. and McAfee Inc. to enable their products to work smoothly with its new Vista operating system. Microsoft has promised the additional information to comp... 

  • Midmarket pros have NAC for identity, access management

    Midmarket firms may not have the budgets of large companies, but IT pros can build identity and access management programs that are as effective as what the big guys have.