informa

Feature

Security That Never Sleeps
Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Here's a framework for getting there.
September 07, 2011
Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Here's a framework for getting there.
by Dark Reading Staff, Dark Reading
September 07, 2011
2 MIN READ
Article
Just Getting Started
Federal agencies still have a long way to go in implementing continuous monitoring. Only 29% of agencies have the tools in place to continuously monitor their IT systems ...
September 07, 2011
Federal agencies still have a long way to go in implementing continuous monitoring. Only 29% of agencies have the tools in place to continuously monitor their IT systems ...
by Dark Reading Staff, Dark Reading
September 07, 2011
1 MIN READ
Article
Midmarket Security: 5 Risks, 5 Practical Responses
Smaller companies deal with enterprise-grade threats and compliance challenges, and partners are imposing requirements for sophisticated controls and audits that may be overwhelming. Here's how to cope.
April 18, 2011
Smaller companies deal with enterprise-grade threats and compliance challenges, and partners are imposing requirements for sophisticated controls and audits that may be overwhelming. Here's how to cope.
by Dark Reading Staff, Dark Reading
April 18, 2011
2 MIN READ
Article
Security Tips For Virtualization
Spinning up VMs is easy--too easy, in fact. Fortunately, keeping virtual servers safe doesn't have to be expensive.
April 03, 2011
Spinning up VMs is easy--too easy, in fact. Fortunately, keeping virtual servers safe doesn't have to be expensive.
by Dark Reading Staff, Dark Reading
April 03, 2011
3 MIN READ
Article
Healthcare's Cloud Challenge
The industry has been slow to embrace cloud computing, but demand could grow.
March 17, 2011
The industry has been slow to embrace cloud computing, but demand could grow.
by Marianne Kolbasuk McGee, Senior Writer, InformationWeek
March 17, 2011
1 MIN READ
Article
Cloud Programming? Ready, Set ... Yow
Clouds today come in two basic flavors: the private cloud (wholly behind the firewall) and the public cloud, which runs on remote hosts. The private cloud currently enjoy...
March 16, 2011
Clouds today come in two basic flavors: the private cloud (wholly behind the firewall) and the public cloud, which runs on remote hosts. The private cloud currently enjoy...
by Dark Reading Staff, Dark Reading
March 16, 2011
2 MIN READ
Article
Backing Up Virtual Machines
We highlight best practices for protecting VM disk files.
March 02, 2011
We highlight best practices for protecting VM disk files.
by Dark Reading Staff, Dark Reading
March 02, 2011
3 MIN READ
Article
Easy-To-Find Brute-Force Tools
Tools are available to create word lists that can be used for brute-force attacks to nab passwords.
October 28, 2010
Tools are available to create word lists that can be used for brute-force attacks to nab passwords.
by Dark Reading Staff, Dark Reading
October 28, 2010
2 MIN READ
Article
SMB Security: Fight The Right Fight
Small businesses must prioritize against the IT security threats they face, which are different from those at larger businesses
October 06, 2010
Small businesses must prioritize against the IT security threats they face, which are different from those at larger businesses
by Dark Reading Staff, Dark Reading
October 06, 2010
9 MIN READ
Article
WAN Security: Your Next Assignment
Firewalls and IDS aren't enough. WAN security pros must embrace data-centric protection.
September 22, 2010
Firewalls and IDS aren't enough. WAN security pros must embrace data-centric protection.
by Dark Reading Staff, Dark Reading
September 22, 2010
2 MIN READ
Article
Protection Efforts Superficial
Database security is a growing concern.
September 17, 2010
Database security is a growing concern.
by Dark Reading Staff, Dark Reading
September 17, 2010
1 MIN READ
Article
For SMBs, Data Protection Is A Virtual Affair
Think you can't afford BC/DR to rival enterprise-class systems? If you have x86 virtualization installed, you might be surprised.
August 27, 2010
Think you can't afford BC/DR to rival enterprise-class systems? If you have x86 virtualization installed, you might be surprised.
by Howard Marks, Network Computing Blogger
August 27, 2010
3 MIN READ
Article
Trusted Identities In Cyberspace
Federal IT and security pros have a role in the development of an "identity ecosystem" in cyberspace that spans the government and business sectors.
August 26, 2010
Federal IT and security pros have a role in the development of an "identity ecosystem" in cyberspace that spans the government and business sectors.
by Dark Reading Staff, Dark Reading
August 26, 2010
2 MIN READ
Article
Next In Cybersecurity Certifications
Cybersecurity certifications from organizations provide important benchmarks that are often a requirement for government jobs.
August 26, 2010
Cybersecurity certifications from organizations provide important benchmarks that are often a requirement for government jobs.
by J. Nicholas Hoover, Senior Editor, InformationWeek Government
August 26, 2010
1 MIN READ
Article
Closing The Cybersecurity Gap In Government
In the face of unrelenting threats to systems and networks, federal agencies must find ways to attract qualified workers and develop new skills internally.
August 26, 2010
In the face of unrelenting threats to systems and networks, federal agencies must find ways to attract qualified workers and develop new skills internally.
by J. Nicholas Hoover, Senior Editor, InformationWeek Government
August 26, 2010
2 MIN READ
Article