Security: Data Protection


Q&A: Cloud Security 101

When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.

Eye on Security: More Devices, More Data Points, Fewer Security Holes: Advanced Security Integration

Innovative, multi-level authentication measures are critical. Companies that use inventive ways to incorporate current technology to safeguard their information will ultimately come out on top.

Q&A: Setting Up a Second Line of Defense

Organizations will have to accept that their gates will be breached and begin preparing their second line of defense -- data platforms -- to mitigate the damage caused by attacks that get through.

RDP Fix Shows Microsoft's Smarter about Windows Security Updates

As Microsoft's response to a recent critical vulnerability demonstrates, Windows security has come a long way -- for the better -- since the days of Code Red.

4 Best Practices for Mitigating DDoS Effects

These four best practices will help government and political organizations mitigate the effects of DDoS attacks.

Supporting BYOD with Strong Mobile Device Management Policies

How to make mobile device management a core part of your security management strategy.

Will Advanced Persistent Threats Grow in 2012?

What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?

Three Trends Driving Data Security Strategies in 2012

In 2012, businesses must align data security with customer value.

The (Ugly) Year in Security

For security administrators, RSA's disclosure of a hack was just one of many serious breaches that occurred in a very bad year.

Debunking 6 Myths about SSL VPN Security

Think VPN makes for secure data access and transfer? Think again.

Social Media: A Hacker's Secret Weapon for Accessing Your Network

Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.

New Windows Worm Exploits IT Sloppiness

Silly or not, the Morto worm has caused a good bit of mischief.

Q&A: The Increasing Complexity of Network Attacks

Attacks are getting increasingly complicated -- not just in the technology they use but in the number of parties involved in a single attack.

Spearphishing on the Rise

Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.

Best Practices for Securing Private Keys and Code-Signing Certificates

Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?

Analysis: RSA SecurID Token Vulnerabilities Back in the Spotlight

The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?

Q&A: Wi-Fi Drives VPN Adoption at Swiss Insurer

Getting and staying connected was key to this Swiss insurance company, but Wi-Fi access meant it had to find a VPN solution.

Security Vulnerabilities Down but Still Strong

Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.

Firewalls Get Failing Marks; Enterprise Security Flunking, Too

Why does IT pass the buck to other internal groups when it comes to safeguarding enterprise security?

How Mobile Computing, Not Windows Desktop, Will Transform Cybercrime

As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.