With World Cup-oriented attacks and a brazen tech-support-by-phone scam, it's business as usual for the ever-creative information security crackers.
Mobile security products fared better than did the broader security market in a very tough 2009. Look for that trend to continue.
IT organizations are highly exposed to security breaches through their information worker's mobile devices.
CA’s chief security architect discusses the three key areas for security professional’s attention this year.
IT shops aren't doing enough to secure their cellular communications. This leaves them wide open to attack. The stakes are high -- and likely to get even higher.
Security will continue to be a hot-button issue this year. Here’s how to protect your business-critical information.
How self-encryption works to secure data on flash and SSD drives.
A recent report by AirTight Networks finds financial services firms are all but throwing out a welcome mat to wireless attacker
To effectively address new security challenges, IT organizations need to tighten coordination and integration between security.
Unless you employ appropriate safeguards, a minor Twitter problem could easily turn into a tempest.
What you can do now to stay a step ahead of the changing vulnerability landscape.
How an enterprise’s culture affects its IT security
Security vendors are stepping up their efforts to close the gap between security and operations
All things considered, 2008 was a quiet but industrious year on the security front.
Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA
Endpoints pose security risks to an enterprise, but identifying those endpoints can be IT's biggest challenge.
Symantec spent more than half a billion dollars to buy its way into the SaaS e-mail and Web security segments
How to handle the special security risks posed by portable devices
Your employees may take the corporate laptop on summer holiday and bring back security risks to your network
IM attacks are on the rise, in part because organizations are deploying unified communications platforms without first hardening them against attacks