Editors' Picks
-
What kind of security protections does a cloud service provider offer?
Amy Larsen-DeCarlo writes that enterprises can expect similar security protections from cloud providers as they get from traditional hosting services.24 Apr 2013
-
Network security assessment: Test firewalls, IDS in multiple ways
Network administrators need to test internal systems such as firewalls and IPS/IDS devices to ensure their networks are safe.18 Apr 2013
-
Network security assessment: Internal testing relies on various tools
Network administrators need to know what steps to take to protect their networks against internal threats.16 Apr 2013
-
Want per-VM reports and statistics? Turn to hypervisor-aware storage
Virtualization admins will have less of an opportunity to blame storage for unidentifiable problems thanks to the advent of hypervisor-aware storage.09 Apr 2013
-
Mobile app trends: Join SearchCIO-Midmarket.com's first tweet jam
Discuss up-and-coming (and dissolving) mobile app trends during SearchCIO-Midmarket.com's first tweet jam, April 10 at 3 p.m. EST.01 Apr 2013
-
SMB network security tools don't have to break the bank
Malware doesn't care if you're an enterprise or a mom-and-pop shop. The good news is SMB network security tools don't have to cost a fortune.27 Mar 2013
-
Cybersecurity legislation takes a back seat, again
Cybersecurity legislation was denied again in a Congress that seems disinterested in facing the truth, but there is plenty of blame to go around.20 Nov 2012
-
Stamp out XSS cross scripting vulnerabilities with proactive measures
Cross-site scripting -- XSS cross scripting -- vulnerabilities and SQL injection attacks are problems for Web app security. Learn to curb these risks.07 Nov 2012
-
IT security issues: The perception and deception of security
Consider a few lesser-known IT security issues before resting on your company's current policies.26 Oct 2012
-
Maintaining SaaS data security while negotiating with vendors
SaaS applications can cause security concerns. Learn how to reduce the risk of losing data in transit by increasing SaaS data security.24 Oct 2012
-
Vulnerability assessment vs. penetration test: Which is right for you?
Learn the differences between a vulnerability assessment and a penetration test and how to determine which is better for your IT compliance processes.24 Sep 2012
-
Top 10 GRC strategy tips for your midmarket organization
Read the top GRC strategy tips from our SearchCompliance.com sister site for advice on cybersecurity, risk management, compliance processes and more.16 Aug 2012
-
Together, we can beat cloud security risks
Cloud security risks are a primary concern for IT pros who hesitate to use cloud services. But taking preventive measures for safeguarding the environment isn't that difficult.02 Aug 2012
-
Tighter security settings on tap for VMware View and PowerCLI
With stringent security settings in place for VMware PowerCLI and View 5.1, admins should reconsider if they should continue using self-signed security certificates in VMware products.28 Jun 2012
More Like This
-
Cloud API security risks: How to assess cloud service provider APIs
The CSA says cloud API security is a top threat to cloud environments. Expert Dave Shackleford explains how to assess the security of providers' APIs.01 May 2013
-
Do SDN northbound APIs need standards?
The Open Networking Foundation talks about its northbound application programming interface (API) involvement and the lack-of-standards issue.09 Jan 2013
-
OAuth security API guide: Recent and related
This guide explores the current state and projected future of OAuth, as well as its effect on Web services and development as a whole.05 Sep 2012
-
How to implement cloud-based security services
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.09 May 2013
-
Can network security devices replace firewalls?
There are many new network security devices on the market today. Expert Chris Partsenidis opines on whether these can replace firewalls.25 Apr 2013
-
Security vendors team up to detect targeted attacks on networks
Security vendors team up to detect malicious attacks that target networks.06 May 2013
Network Management Strategies for the CIO