IT/Networking Columns & Features Archive

  • The Virtual 9/11

    Point-of-Sale systems may be the ultimate IT Security vulnerability

    Article • September 2nd, 2011

  • Identity Management’s Great Bang for the Buck

    Identity and access management (IAM) technologies can help you gain the necessary control of user accounts

    Article • August 31st, 2011

  • The two distinct approaches to data loss prevention

    Comparing data-at-rest to data-in-motion security procedures

    Article • August 9th, 2011

  • How to Retain Your IT Talent

    How is your IT staff retention? Are your IT professionals in it for the long haul, or are they just going through the motions waiting for the next best thing? The solutions for retaining IT talent are relatively simple. It is not really about money...

    Article • June 9th, 2011

  • Bringing Back the Good Old Days

    It’s amazing what a decade will do to a market — especially in the ever-changing world of security. Back during the dot-com craze of the mid to late 90s, IT security was a hot commodity. Individual security researchers and developers such as Peter...

    Article • May 19th, 2011

  • Know Your IP Network

    An IP-networked based system can be reliably built. And it all starts with planning. By anticipating worst case scenarios, predictable performance can be achieved. Leverage the knowledge and expertise of your partners to create a plan for success that...

    Article • April 15th, 2011

  • Navigating the Security Industry

    three important principles which impact integrator success include: harnessing ever-changing technology; approaching security as a value-added service provider and not just as another security contractor; and recognizing the extraordinary importance of...

    Article • April 14th, 2011

  • Ingram Micro Canada named value added distributor for gateProtect

    Company extends partner network to Canada

    Article • March 30th, 2011

  • Once More Into the Breach

    Imagine the scenario: Your network has been penetrated and sensitive data has been exposed. From a public relations mess, to an expensive forensics analysis, to improper handling of breach notifications, to those affected — everything that could have...

    Article • March 24th, 2011

  • VASCO acquires DigiNotar

    Acquisition to strengthen company's PKI and DIGIPASS offerings

    Article • January 11th, 2011

  • IT security firm Blue Coat receives CDW 'Partner of the Year' award

    Five companies earn recognition for strong performance in support of CDW customer initiatives

    Article • December 3rd, 2010

  • Survey: Federal IT leaders lack confidence in CyberScope

    Many don't believe online reporting tool will result in increased network security, reduction of costs

    Article • October 22nd, 2010

  • The security week that was: 08/20/10 (Encrypted emails)

    A weekly surveillance of the news shaping your profession

    Article • August 20th, 2010

  • Quest adds Passlogix v-GO single sign-on to technology services

    Solution simplifies and secures application access for firm’s Fortune 50-5000 clients

    Article • June 22nd, 2010

  • Router Security

    Part three of a continuing series on network security for physical security professionals

    Article • May 6th, 2010