Global study of security personnel identifies goals, points out risks and staffing issues
Study lists oversights that can lead to denial-of-service attacks, data theft, or control of a system by hackers.
Protecting the network is no longer enough. IT needs a watchdog to protect databases from external breaches and internal sabotage.
The security challenges and mitigation strategies to help you migrate your enterprise applications to the cloud while ensuring your data’s safety.
Where is cybersecurity headed? We look at how regulation, social networking, and popular technologies (such as cloud computing) will impact your enterprise’s security management.
Asset management software can complement your current security tools to provide more complete desktop security.
IT organizations are highly exposed to security breaches through their information worker's mobile devices.
CA’s chief security architect discusses the three key areas for security professional’s attention this year.
IT shops aren't doing enough to secure their cellular communications. This leaves them wide open to attack. The stakes are high -- and likely to get even higher.
Security will continue to be a hot-button issue this year. Here’s how to protect your business-critical information.
From virtualization to cloud computing, what today's trends tell us about the focus of security professionals next year.
What kept security administrators awake nights this year, and where should they focus their attention next year?
Compared to other market segments, the security space was a relative safe harbor in a year of economic turbulence.
In the age of virtualization and cloud computing, administrators need a holistic approach.
Today’s cybercriminal is especially aggressive about penetrating networks to gain access to valuable data. We explain what steps you must take now to protect your systems.
How performing a software update can hijack your system.
Health-care providers are once again racing to ensure compliance with another set of information security safeguards.
A new solution to data security is predicated on -- and anticipates -- human behavior by embedding corporate policies into documents and images.
Computer Online Forensic Evidence Extractor distributed on "pirate" sites.
This year, spammers are more proactive than ever, and that has some security researchers worried.