Security


Q&A: Best Practices for z/OS Security

Mainframes are typically more secure than most other platforms, but that doesn't mean IT can ignore them.

Complex Attacks Bypassing Enterprise Safeguards

Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.

Debunking 6 Myths about SSL VPN Security

Think VPN makes for secure data access and transfer? Think again.

Social Media: A Hacker's Secret Weapon for Accessing Your Network

Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.

Microsoft Report Dishes on Malware Prophylaxis, Zero Day Hysteria

Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.

Security: IT Shops Unprepared to Police Social Media in the Enterprise

Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.

How to Evaluate a Cloud Provider’s Security Features

An introduction to the security requirements you should expect from a cloud service provider.



New Windows Worm Exploits IT Sloppiness

Silly or not, the Morto worm has caused a good bit of mischief.

Q&A: The Increasing Complexity of Network Attacks

Attacks are getting increasingly complicated -- not just in the technology they use but in the number of parties involved in a single attack.

Dire Warning from McAfee Security Specialist

A new report from security specialist McAfee warns that the information security sky is nigh on falling.

IT Still Facing Mobile Challenges

Neither iOS nor Android has been designed with enterprise security in mind. That makes securing them a challenging proposition.

5 Reasons to Replace Your Traditional One-Time Passwords

Millions rely on traditional one-time password tokens. Here’s why your organization may want to replace or augment this approach for perimeter security.

Spearphishing on the Rise

Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.

Q&A: Best Practices for Avoiding Mobile Malware

Mobile devices are bombarded by direct attacks and those designed for any Web-connected device. We explain best practices for end users and best practices for IT that can protect against these attacks.

A New Approach to Mobile Encryption

Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.

New Malware Attacks Both PCs and Macs

Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.

Best Practices for Securing Private Keys and Code-Signing Certificates

Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?

Q&A: Preventing Mobile Vulnerabilities

Best practices for keeping mobile devices safe.

Analysis: RSA SecurID Token Vulnerabilities Back in the Spotlight

The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?

Q&A: Wi-Fi Drives VPN Adoption at Swiss Insurer

Getting and staying connected was key to this Swiss insurance company, but Wi-Fi access meant it had to find a VPN solution.