Secure or not? 10 spot checks will tell you

July 17, 2012
You don't need a high-powered consultant to determine whether your security sucks. Try this simple checklist instead
Read more »

How to have BYOD and security, too

July 10, 2012
Put a standard security assessment framework in place, and you can begin to wrestle with the knotty problems BYOD presents
Read more »

Why BYOD scares me

July 03, 2012
BYOD is an epic battle in the ongoing war of usability against security -- and usability is winning out
Read more »

RSA token attack obscures deeper security flaws

June 28, 2012
Authentication will always have holes -- which is why you should focus on limiting the damage after bad guys gain access
Read more »

The two most feared attacks and how to avoid them

June 26, 2012
Large organizations with ample resources quake in their boots over two common security threats. Here's your best defense
Read more »

How to restrict developers' admin rights

June 19, 2012
Security must dial down the number of people with system administrator rights -- including developers, even if their productivity suffers
Read more »

16 security problems bigger than Flame

June 12, 2012
Flame has proven a complex piece of malware, but if it were to disappear today, the Internet would just as insecure
Read more »

Why I can't get inflamed over Flame

June 05, 2012
The latest malware doesn't deserve its celebrity status, but the media-vendor echo chamber will continue to raise the alarm
Read more »

The one company that wasn't hacked

May 29, 2012
How did this solitary firm do it? Not with fancy technology -- but with commonsense controls anyone can enforce
Read more »

Event log management made easy

May 22, 2012
Most companies' log files carry too much noise. For a better log management system, turn the normal model on its head
Read more »
©1994-2014 Infoworld, Inc.