April 2009
-
April 30, 2009
30
Apr'09
NAC Basics: Implementation and integration
What is NAC, how can you know if it's right for your business and how can you implement a NAC configuration? In this second video of a two-part series, Joel Snyder explains NAC implementation and integration basics. Continue Reading
-
April 30, 2009
30
Apr'09
Best email antivirus policy? Scan everything
Despite the performance hit, IT shops should adopt a best practice of scanning all email messages. Shortcuts, such as skipping scans of image or audio files, may lead to virus infections. Continue Reading
-
April 30, 2009
30
Apr'09
Selecting a SIM for a midmarket business
Although you think security information management (SIM) systems are too pricey and complex for your midmarket business, you may want to reconsider. Diana Kelley details some ways to cut cost and complexity while taking advantage of a SIM tool in ... Continue Reading
-
April 30, 2009
30
Apr'09
How to configure email antivirus scanners to block only when necessary
Taking the shortcut of optimizing your email antivirus scanners to improve performance will eventually compromise your organization's security. Continue Reading
-
April 30, 2009
30
Apr'09
How to achieve PCI DSS compliance in a midmarket business
Learn about PCI DSS compliance for a midmarket business, including the standard's six areas of focus and how to document your organization's compliance. Continue Reading
-
April 30, 2009
30
Apr'09
NAC Basics: Laying the groundwork
What exactly is NAC, how can you know if it's right for your business and how can you implement a NAC configuration? In this first video of a two-part series, Joel Snyder of Opus One explains what NAC is and how it can benefit your company. Continue Reading
-
April 23, 2009
23
Apr'09
Midmarket security managers must push risk acceptance to the business
Experts at the 2009 RSA Conference say midmarket security managers must work with business leaders to define acceptable risk, and transfer risk prioritization to them when appropriate. Continue Reading
-
April 14, 2009
14
Apr'09
Microsoft Stirling Beta 2 release includes Exchange SaaS offering
Microsoft continues to meld security and identity management, with the Beta 2 release this week of Stirling, the next generation of its Forefront Security Suite. Continue Reading
-
April 08, 2009
08
Apr'09
Midmarket security governance: Develop an IT engagement model
Midmarket IT organizations may follow an engagement model that facilitates the integration of information security into the business. Continue Reading
-
April 06, 2009
06
Apr'09
Assess your security state in five steps
Prioritize your security spending by identifying how data moves and users interact, and what vulnerabilities exist in infrastructure, systems and applications. Continue Reading