Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.
What is IAM and how can you make an IAM project a success?
Getting a handle on UNIX vulnerabilities is no easy task.
Why does IT pass the buck to other internal groups when it comes to safeguarding enterprise security?
These tips can help you minimize mobile threats.
Who said hardware authentication tokens are infallible? CA's new program contrasts the advantages of its software-based approach with RSA Security's hardware-based SecurID model.
A new survey shows a disconnect between the security-first mentalities of auditors and the compliance-driven concerns of their employers.
Two security approaches, working in tandem, provide superior enterprise protection.
Nine out of ten enterprises say they plan to invest in new endpoint security technologies to help them better manage mobile devices
As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.
Contains only three fixes.
Next-generation tokenization has the potential to help businesses protect sensitive data in the cloud in a more efficient and scalable manner than encryption and first-generation tokenization.
DDoS attacks are bigger and more frequent than ever, and a lack of insight into IPv6 security is particularly worrisome.
Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.
The availability and sophistication of crimeware kits has contributed to the rapid evolution -- as well as the increasing sophistication -- of cybercrime itself.
How do you secure an environment in which risky behavior is business as usual?
Officials in the UK now suggest that a cyberattack from purported White House e-mail accounts actually originated from China, and the perpetrator used a hoax e-mail address that resembled a White House account.
How to take control of default group access permissions settings for Windows Server.
We outline seven steps that help you address the people aspect of data security.
Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.