network security - News, Features, and Slideshows


  • Is Bring Your Own Identity a security risk or advantage?

    The "Bring Your Own Identity" (BYOID) trend in which websites let users authenticate using identities established through Facebook, LinkedIn, Google, Amazon, Microsoft Live, Yahoo or other means raises some questions in the minds of IT and business managers. And a survey conducted by Ponemon Institute shows a vast difference in how the IT and business sides think about this so-called BYOID method of authentication.

    Written by Ellen Messmer29 July 14 04:51
  • Gartner: Top trends in IT security technology

    Gartner has kicked off its annual Gartner Security and Risk Management Summit 2014 in National Harbor, Maryland, by pointing to the top threat challenges heading into next year -- and added that in the future, the term IT security will give way to "digital security" to encompass newer challenges, such as the Internet of Things.

    Written by Ellen Messmer24 June 14 05:03
  • To be breached is human

    While the security industry likes to focus on application security and system vulnerabilities, as well as the effectiveness (or lack thereof) of the tools used to defend IT systems -- the vulnerabilities that create real-world breaches are often created by the wetware between our ears -- not defective tools.

    Written by George V. Hulme21 May 11 06:06
  • Security on a Shoestring Budget

    For many, security is like going to the dentist--you have to deal with it, but that doesn't mean you have to go willingly, or like it once you get there. One of the main problems with IT security, though, comes down to money. While new servers or PCs can be justified as an investment, security is seen simply as an expense and a headache. But, what if you could protect your network and your PCs without breaking the bank?

    Written by Tony Bradley09 March 11 02:30