There's a significant disconnect between IT and business executives when it comes to disaster recovery preparedness.
Threats delivered through the Web are increasing in number and severity. A Web filtering solution can reduce an enterprise’s vulnerability.
A recent report by AirTight Networks finds financial services firms are all but throwing out a welcome mat to wireless attacker
Unless you employ appropriate safeguards, a minor Twitter problem could easily turn into a tempest.
P2P file sharing is on the rise, and so are its risks. We show you five tips that can help you select a secure enterprise file-transfer solution.
Awareness that a thorough security policy should include measures for secure network printing is rising slowly but surely.
A closer look at the components and best practices for success with your data loss prevention project.
A new report shines light on Web-based attacks, concluding that -- in terms of both volume and variety -- they pose a significant, and significantly expanding, threat.
Spammers are tweaking their messaging to better exploit recession-related fear, uncertainty, and doubt
How an enterprise’s culture affects its IT security
When an employee leaves a company, more than just a body walks out the door. What may be shocking is how frequently data thefts occur and how employees justify their behavior.
One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users
Security vendors are stepping up their efforts to close the gap between security and operations
Data protection challenges grow as data volumes grow. We examine the best practices IT can follow to maximize data protection.
How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.
Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
All things considered, 2008 was a quiet but industrious year on the security front.
Employees who believe they may be fired may steal proprietary information to blackmail management
How deploying hardware in the data center that runs a centralized security suite that handles multiple security configurations can protect a diverse set of end users.
Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA