Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.
Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.
An introduction to the security requirements you should expect from a cloud service provider.
Silly or not, the Morto worm has caused a good bit of mischief.
Attacks are getting increasingly complicated -- not just in the technology they use but in the number of parties involved in a single attack.
A new report from security specialist McAfee warns that the information security sky is nigh on falling.
Neither iOS nor Android has been designed with enterprise security in mind. That makes securing them a challenging proposition.
Millions rely on traditional one-time password tokens. Here’s why your organization may want to replace or augment this approach for perimeter security.
Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.
Mobile devices are bombarded by direct attacks and those designed for any Web-connected device. We explain best practices for end users and best practices for IT that can protect against these attacks.
Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.
Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.
Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?
Best practices for keeping mobile devices safe.
The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?
Getting and staying connected was key to this Swiss insurance company, but Wi-Fi access meant it had to find a VPN solution.
Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.
What is IAM and how can you make an IAM project a success?
Getting a handle on UNIX vulnerabilities is no easy task.
Why does IT pass the buck to other internal groups when it comes to safeguarding enterprise security?