Enterprise information security management

  • June 15, 2006 15 Jun'06

    CIO Decisions 2006: 100% security just an illusion

    When it comes to buying and implementing security systems, it's all about determining your risk level. Even then, CIOs have to surrender the notion they can foresee and prevent all threats.

  • June 08, 2006 08 Jun'06

    Playing hardball with your vendor

    As the economy picks up, vendors are becoming more brazen, changing terms and using contract loopholes to walk away from small deals to land the big fish. An IT attorney gives midmarket CIOs a primer on how to level the playing field at the ...

  • June 06, 2006 06 Jun'06

    Vista security skepticism swells, according to survey

    More than half of those who answered a recent survey say they have no current plans to deploy the upcoming Windows Vista OS.

  • May 31, 2006 31 May'06

    Wake-up call for CIOs as Symantec flaw outed

    The disclosure last week of a major flaw in Symantec's antivirus software is another reminder for CIOs that organizations need multiple layers of protection, analysts warn. Security should also factor into your evaluation of every commercial ...

  • May 31, 2006 31 May'06

    End users play big role in data classification

    Without a proper data classification scheme, ILM is putting the cart before the horse, and some shops are pushing the job of classifying files down to users.

  • May 25, 2006 25 May'06

    Report: Microsoft shaking up security market

    A new Forrester analysis says Microsoft is already gaining on the top security vendors, but the battle for security mindshare is just beginning.

  • May 25, 2006 25 May'06

    Employees to CIOs: It's OK to watch

    It probably won't come as a shock to learn that more than half of your organization's employees are surfing the Internet for fun while at work. But what might surprise you is that most of them say it's OK for you to control when and what they view.

  • May 24, 2006 24 May'06

    CIOs fighting uphill battle against renegade apps

    Experts say keeping unsanctioned apps and technologies off company computers is a battle you can't win. But protecting your network is possible. Two options are getting a lot of buzz. Both require keeping communication lines open and static-free.

  • May 18, 2006 18 May'06

    Survey: Women more likely to download spyware

    Women may download spyware more often, but men are more likely to surf risky Web sites on company time, according to new survey results.

  • May 11, 2006 11 May'06

    App security defense: Strategies to lock down your Web applications

    Most organizations have deployed a layered approach to tackling security at the infrastructure level, but now experts say it's time to apply that approach to Web applications.

  • May 08, 2006 08 May'06

    Security tops IT budgets, but spending strategies shift

    Security will remain a top spending driver in 2006, according to research firm IDC. But differences exist.

  • March 29, 2006 29 Mar'06

    Data theft prompts firm to lock down, protect network

    After a disgruntled employee made off with several CDs of data, an automotive data reseller realized it had to install better protection at the endpoints.

  • March 28, 2006 28 Mar'06

    High expectations in enterprise not dampened by Vista delay

    Windows managers, analysts weigh in on the new plans to delay the release of Vista.

  • March 28, 2006 28 Mar'06

    Fidelity snafu spotlights need for laptop security policies

    The theft last week of a Fidelity-owned laptop containing sensitive data on thousands of clients could have easily been prevented. Are your users paying attention to laptop security policy?

  • March 22, 2006 22 Mar'06

    Poor government security makes industry wary

    An annual review shows government security practices aren't improving. Experts worry it could harm Homeland Security's ability to work with the private sector to stop cybercrime.