Stories by Matt Hines

  • DLP experts preach taking the long-term view

    Data leakage prevention has become one of the hottest subsets of the IT security market, but organizations hoping to utilize the tools must retain realistic goals and find the right technologies to meet their individual business models, experts maintain.

  • The debate over the right data loss prevention strategy

    Much of the corporate data that gets exposed goes through messaging systems -- not through insider attacks or external hacks -- when users mistakenly send out confidential information via e-mail, instant messaging, and FTP systems, or when they forget to use encryption tools.

  • Microsoft security maturing fast

    One year ago, Microsoft was defending the quality of its products, battling with the world's largest security vendors over features in its next-generation platforms, and pitching the company's nascent promise as a provider of IT systems-defense tools at the annual RSA conference.

  • SMB - Apps security testing companies ride wave

    Providers of applications security testing tools say business is taking off, as more customers are building such capabilities into their development lifecycles and large platform providers have picked off some of their closest rivals.

  • HP's security plans right on track

    IT industry giant HP is experiencing marked growth of its security business less than one year after re-launching a number of its products and services under its Secure Advantage brand, company executives claim.

  • SMB - Vontu chief touts Symantec deal

    Most often after one of their peers is acquired by a larger competitor, business leaders at rival IT industry startups will harp on the notion that such a buyout kills the momentum and innovation ongoing at the company that has been purchased.

  • Scaring users into IT security

    There's nothing like telling a good horror story to encourage your employees -- from senior executives to rank-and-file workers -- to do their part in improving IT security.

  • The top 10 security land mines

    Many companies spend a small fortune and deploy a small army to secure themselves from the many security threats lurking these days. But all those efforts can come to naught when making any of these common mistakes. The results can range from embarrassing to devastating, but security experts say that all are easily avoidable.

  • SMB - Security futurists shun perimeter, antivirus systems

    Outsourcing, grid computing, and hacker professionalism are trends that cannot be stopped, and the sum total of those factors will have a dramatic effect on the way businesses attempt to protect their IT system in the future, researchers and analysts agree.

  • How great IT security leaders succeed

    As the threat of attack, both external and internal, continues to take root and as data-handling regulations continue to proliferate, the role of a chief information security officer appears to be growing more complex by the day. Many CISOs are doing an admirable job of stemming the tide of data loss and keeping their heads above water around compliance. But some IT security leaders are doing it better than the rest, according to a recent Forrester Research report, which has identified several characteristics that make these top CISOs more successful than their peers.

  • Data-leak security proves to be too hard to use

    Data-loss-prevention technologies promise organizations the chance to stop sensitive information from falling into the wrong hands. But the process of creating the rules necessary to use the systems' enforcement capabilities is proving extremely complex for customers.

  • SMB - Microsoft touts Longhorn security

    Microsoft is pushing the improved security of its Windows Server 2008 software package as one of the primary reasons why business customers should upgrade to the long-awaited product refresh as quickly as possible.