As Microsoft's response to a recent critical vulnerability demonstrates, Windows security has come a long way -- for the better -- since the days of Code Red.
We explore the benefits of interconnecting physical and cyber security.
New targeted attacks masquerade as legitimate correspondence from the Better Business Bureau. It's fiendishly clever, which is exactly the point.
Just how much of a problem is the RSA key kerfuffle? Two research teams weigh in about encryption schemes.
Mobile devices are just one of a number of assets that must be managed. Fortunately, the cloud can help.
A best-practices approach and advice for securing your Windows 7 environment.
Changing identity and access management needs are pressuring IT to revise its security strategies. Why is the federal government involved?
These four best practices will help government and political organizations mitigate the effects of DDoS attacks.
How to make mobile device management a core part of your security management strategy.
SSL and TSL are used to encrypt almost all sensitive communications traffic on the Internet.
A look at how security is evolving around three key information technology developments.
What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?
Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond?
In 2012, businesses must align data security with customer value.
Of 13 items in release, 3 address remote code execution flaws.
For security administrators, RSA's disclosure of a hack was just one of many serious breaches that occurred in a very bad year.
Mainframes are typically more secure than most other platforms, but that doesn't mean IT can ignore them.
Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.
Think VPN makes for secure data access and transfer? Think again.
Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.