Organizations will have to accept that their gates will be breached and begin preparing their second line of defense -- data platforms -- to mitigate the damage caused by attacks that get through.
As Microsoft's response to a recent critical vulnerability demonstrates, Windows security has come a long way -- for the better -- since the days of Code Red.
These four best practices will help government and political organizations mitigate the effects of DDoS attacks.
How to make mobile device management a core part of your security management strategy.
What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?
In 2012, businesses must align data security with customer value.
For security administrators, RSA's disclosure of a hack was just one of many serious breaches that occurred in a very bad year.
Think VPN makes for secure data access and transfer? Think again.
Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.
Silly or not, the Morto worm has caused a good bit of mischief.
Attacks are getting increasingly complicated -- not just in the technology they use but in the number of parties involved in a single attack.
Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.
Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?
The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?
Getting and staying connected was key to this Swiss insurance company, but Wi-Fi access meant it had to find a VPN solution.
Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.
Why does IT pass the buck to other internal groups when it comes to safeguarding enterprise security?
As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.
Contains only three fixes.
Next-generation tokenization has the potential to help businesses protect sensitive data in the cloud in a more efficient and scalable manner than encryption and first-generation tokenization.