Search Results | Security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...931 NEXT
Sort by:  Most Relevant  |  Date
Trends in IT security signal increased partner opportunity

Blog  IT security has always been a moving target for businesses. The end result: Some do, some dont and many dont do enough. However, as companies adopt mobile and cloud IT delivery models, and come face to face with privacy and compliance requirements, theres renewed interest in IT security an...

Last updated: Apr 2, 2015   3:20 PM GMT  |  Blog: Channel Marker   |      CompTIA, Gartner, IT security
Sample I.T Security Policy

Blog  Dear Folks Now I am going to concentrate on the SAMPLE I.T. Security policy for any Organization, I will try to cover in brief some important aspects in the forthcoming weeks, as we all know how important a Security Policy is. I did get an inspiration to draft a sample security policy after readin...

Last updated: Jun 22, 2008   6:08 AM GMT  |  Blog: Network technologies and trends
ISC-squared Creates a Software Lifecycle Credential

Blog  Ask any security-savvy software developer how best to make code secure, and he or she will quickly tell you something like "To make code secure, you must design it to be secure, then test the heck out of it to make sure the implementation lives up to that design goal." And in fact, a growing body of...

Last updated: Jun 6, 2009   5:29 PM GMT  |  Blog: IT Career JumpStart
Security Squad: Database security, encryption

Blog  Information Security magazine editors Neil Roiter and Michael Mimoso discuss Google's foray into the security market and whether companies should turn to database encryption to meet the PCI Data Security Standard in the wake of the TJX data security breach. Also the editors discuss whether the "mont...

Last updated: Jul 17, 2007   1:35 PM GMT  |  Blog: Security Wire Weekly
Podcast: Security Squad - Datbase security, encryption

Blog  Information Security magazine editors Neil Roiter and Michael Mimoso discuss Googles foray into the security market and whether companies should turn to database encryption to meet the PCI Data Security Standards in the wake of the TJX data security breach. Also the editors discuss whether the ...

Last updated: Jun 8, 2007   8:49 PM GMT  |  Blog: Security Bytes
Cisco announces new CCNP Security Curriculum

Blog  Cisco with draws current CCNP Security curriculum by announcing the new set of Cisco CCNP Security exams namely 300-206 SENSS, 300-207 SITCS, 300-208 SISAS and 300-209 SIMOS respectively. All the previous CCNP Security exams. 642-637 SECURE v1, 642-617 FIREWALL v1.0, 642-647 VPN v1.0, 642-627 IPS v7...

Last updated: Jan 27, 2014   11:22 AM GMT  |  Blog: Network technologies and trends   |      Networking
The Security Soapbox: Our 10 Favorite Information Security Blogs

Blog  To keep from falling asleep on the job (figuratively and literally), keep your mind sharp with the musings, analysis and tips from these information security pros: 1. ...And you will know me by the trail of bits: Dino Dai Zovi has 9+ years of information security experience under his belt. He is a...

Last updated: Sep 14, 2010   11:09 AM GMT  |  Blog: Enterprise IT Watch Blog
Compliance versus security

Blog   This years Security 7 Award winners discuss the relationship between security and compliance and whether compliance helps improve security or detracts from it. The podcast participants include: Phil Agcaoili, chief information security officer, Cox Communications Brian Engle, director of in...

Last updated: Oct 21, 2010   2:27 PM GMT  |  Blog: Security Wire Weekly
Podcast: Security Roundtable

Blog  Security Roundtable: Mac hacks -- May 3, 2007 In the debut edition of SearchSecurity.com's Security Roundtable news-talk podcast, editors debate the growing concern about Apple security and whether Apple really cares about keeping its products secure, the emergence of Google hacking as an enterpris...

Last updated: May 4, 2007   1:25 PM GMT  |  Blog: Security Bytes
Trend Micro launches SaaS security platform

Blog  Another security vendor is getting into the Software-as-a-Service (SaaS) business. Trend Micro has released SecureCloud, a platform that offers messaging gateway security, hosted email security and botnet identification services. And the Cupertino, Calif.-based company is aiming SecureCloud at its ...

Last updated: Jul 31, 2007   2:28 PM GMT  |  Blog: Channel Marker
Both network and application security are important

Blog  When people think of security testing, they often think about the network layer -- that area outside of the application. However, application security -- security within your application -- is important as well. John Overbaugh explains the difference in his two recent tips. In Boost network securit...

Last updated: Apr 14, 2011   4:22 PM GMT  |  Blog: Software Quality Insights
SMBs want security

Blog  SearchSecurityChannel's sister site SearchSMB compiled their top 10 tips for 2006 -- seven of which are security related. It seems SMBs can't get enough security, and the topics run the gamut. Here they are, in no particular order: Email encryption VoIP security Mobile device security Linux sec...

Last updated: Dec 12, 2006   10:05 PM GMT  |  Blog: Channel Marker
Security industry remains resilient to tough economy

Blog  A new survey from Gartner Inc. is confirming what industry analysts and experts have said over the last year and a half: The Security industry is resilient to the tough economy. Gartner is predicting a slight increase in security spending in 2010. A survey conducted in April and May of 1,000 IT pro...

Last updated: Sep 8, 2009   7:49 PM GMT  |  Blog: Security Bytes
Experts: Security software not as safe as you think

Blog  One of the reasons enterprises rely on layers of security products is because of the flaws that often appear in their main IT infrastructure. But according to a panel of experts at the Gartner IT Security Summit in Washington, those security tools aren't as ironclad as you think. More than ever bef...

Last updated: Jun 5, 2007   12:52 AM GMT  |  Blog: Security Bytes
The advanced persistent threat and the state of traditional perimeter protection

Blog  This years Security 7 Award winners discuss targeted attacks and how strategies for securing the network perimeter have changed. The podcast participants include: Phil Agcaoili, chief information security officer, Cox Communications Brian Engle, director of information security, Temple-Inland ...

Last updated: Oct 20, 2010   5:05 PM GMT  |  Blog: Security Wire Weekly
Oldie but goodie wireless security resources

Blog  With any responsible wireless network deployment comes security. Securing the access points, securing the computers and securing the communication sessions in between. With enterprise APs, wireless IPSs and related systems well beyond their adolescence, many enterprises have used them to their advan...

Last updated: Aug 25, 2010   6:21 PM GMT  |  Blog: Enterprise IT Watch Blog
VMware security coming to the forefront?

Blog  Many virtualization analysts punt on the issue of security. But two recent events have brought security into higher relief: the uncovering of VMware's file-sharing security flaw and VMware's announcement of VMsafe, a virtual appliance that adds a layer of security to apps running on virtual machines...

Last updated: Mar 24, 2008   6:04 PM GMT  |  Blog: Virtualization Pro
Inline Security and A Resilient Inline Security Framework

Blog  What is Inline Security? How many of us would be knowing this? Phil Trainor continues with us in this third post in the series. While in the first post he enlightens us with insights on Network Security Landscape, in the second post he talks about a deep correlation between Network Security and Netw...

Last updated: Aug 9, 2017   5:22 PM GMT  |  Blog: Quality Assurance and Project Management   |      Ixia, Resilient Systems, Security Framework
Cigital: a new Agile (Security) Manifesto

Blog  Application security and software security consulting company Cigital says that its time for a new layer to be placed on top of theAgile Manifesto-- a set of principles that was released in 2001 as a reaction to documentation-heavy software development practices. The name of that new layer? It'...

Last updated: Jul 20, 2016   9:01 AM GMT  |  Blog: CW Developer Network
2011 security wins and fails - Android app security, data breach management

Blog   In part one of this two-part podcast, special guest Andrew Jaquith of Perimeter E-Security joins the SearchSecurity editorial team in exploring the highs and lows of 2011 for the security industry. Mobile device platforms were built with security in mind, but in 2011 cybercriminals have had some su...

Last updated: Dec 22, 2011   8:00 PM GMT  |  Blog: Security Wire Weekly
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...931 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: