Security


Spam Takes a Holiday

Talk about post-Christmas letdowns: spam volumes tanked after December 25th. What happened -- and can it last?

Q&A: Data Protection Strategies for Mobile Computing

Best practices for protecting your mobile and enterprise assets.

Q&A: Securing Your Mobile Environment

How to improve security for mobile users in light of new, complex technologies such as cloud computing.

Security: Data Disposal 101

According to a new study, more than half of U.S. businesses aren’t erasing data from computers or storage assets prior to retiring them.

Modern Antivirus, Whitelisting, and Enterprise Security

Whitelisting applications can be a more effective and lower-impact technique for protecting your enterprise than are traditional antivirus approaches.

A Tough Year that Could Have Been Worse

Security admins faced a host of vulnerabilities and new attacks in 2010, but the nightmare scenarios that could've kept security pros up at night blessedly didn't come to pass.

Q&A: Security in a Virtualized Environment

How are IT organizations responding to the new security challenges of administrative privileges in a virtualized environment?



Database Security: Why Patching Isn't Popular with DBAs

Database security patching is a tricky business. It's so tricky, in fact, that some DBAs prefer to rely on defense-in-depth controls to protect their systems.

Tracking Trends: Data Security Risks

The top three risk trends in 2010, and what lies ahead for security professionals in 2011.

Q&A: Identity and Access Management

What’s driving the interest in identity and access management, and how can you address the challenges the technology presents?

Microsoft Investigating Windows Proof-of-Concept Flaw

Microsoft says its security team is looking into an elevation-of-privilege exploit affecting Windows-based systems.

Microsoft Document Outlines Its Cloud Security Infrastructure

Microsoft's new white paper explains the organizational and standards-based underpinnings of its cloud security efforts.

A 3-Step Defense-in-Depth Strategy for Combating Cyberterrorism

Learn how a "defense-in-depth" strategy can provide greater protection to your enterprise.

Retailers Under Attack

An upsurge in retail-oriented phishing exploits underscores the growing menace posed by targeted attacks.

Microsoft Goes Easy With November Patch Release

Microsoft's November security update arrived today, and it's something less than a Thanksgiving meal.

New IE Zero-Day Attack Surfaces

In a security advisory, Microsoft is warning users of Internet Explorer vulnerability that could allow remote code execution by hackers.

Mid-Size Enterprises are Prime Targets

Mid-size shops are increasingly -- even disproportionately -- coming under attack by hackers, yet few security budgets are rising.

Q&A: IAM and the Unix/Linux Organization

Unix/Linux systems needn't be islands of identity; we show you the challenges and options for addressing authentication, provisioning, and security and take a closer look at Active Directory bridges.

Microsoft: Java Worse Than PDF as Security Threat

Java should be considered a top software security threat, even more so than Adobe PDF files, according to Microsoft's announcement.

The Less Productive Mobile Workforce

Mobile users are more likely to get themselves into trouble -- but not the kind you'd expect.