Despite its name, Secure Sockets Layer isn't totally secure. We explain the risks that arise from increased use of SSL within enterprise networks.
Study lists oversights that can lead to denial-of-service attacks, data theft, or control of a system by hackers.
Where is cybersecurity headed? We look at how regulation, social networking, and popular technologies (such as cloud computing) will impact your enterprise’s security management.
Today’s cybercriminal is especially aggressive about penetrating networks to gain access to valuable data. We explain what steps you must take now to protect your systems.
Health-care providers are once again racing to ensure compliance with another set of information security safeguards.
These five best practices will help you reduce the risk of internal data misuse and accidental data leakage.
In the online banking segment, some industry watchers warn, the bad guys are winning the war against unsuspecting account holders.
Although considerable sweat and tears have gone into data protection standards, it's time to spur discussion about how our data protection thinking and schemes might benefit from new ideas and technologies.
Spam levels surged in May, but technologies such as traffic and connection management helped reduce or rein-in the volume of malicious traffic.
There's a significant disconnect between IT and business executives when it comes to disaster recovery preparedness.
Administrator rights let users do everything on a system, but these rights are also the target of malware and other vulnerabilities.
Mainframe operators know which controls to implement, but auditors -- who frequently come from the distributed side of the divide -- don’t.
Proper planning that includes addressing security will help you reap the benefits of virtualization and satisfy those who ensure business continuity and protect corporate data.
A recent report by AirTight Networks finds financial services firms are all but throwing out a welcome mat to wireless attacker
Unless you employ appropriate safeguards, a minor Twitter problem could easily turn into a tempest.
What you can do now to stay a step ahead of the changing vulnerability landscape.
Phishing activity increased by almost 40 percent in a 12 month period.
Majority of IT operations use semi-automatic or manual processes to manage configuration settings
When an employee leaves a company, more than just a body walks out the door. What may be shocking is how frequently data thefts occur and how employees justify their behavior.
To successfully address weaknesses in current e-mail security, IT departments can take six proactive steps now to help their enterprises meet compliance regulations and prevent e-mail misuse.