Of 13 items in release, 3 address remote code execution flaws.
For security administrators, RSA's disclosure of a hack was just one of many serious breaches that occurred in a very bad year.
Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.
Think VPN makes for secure data access and transfer? Think again.
Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.
Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.
Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.
Silly or not, the Morto worm has caused a good bit of mischief.
Attacks are getting increasingly complicated -- not just in the technology they use but in the number of parties involved in a single attack.
A new report from security specialist McAfee warns that the information security sky is nigh on falling.
Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.
Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.
The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?
Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.
Getting a handle on UNIX vulnerabilities is no easy task.
Why does IT pass the buck to other internal groups when it comes to safeguarding enterprise security?
As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.
Contains only three fixes.
Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.
The availability and sophistication of crimeware kits has contributed to the rapid evolution -- as well as the increasing sophistication -- of cybercrime itself.