Security


Q&A: Data Protection Strategies for Mobile Computing

Best practices for protecting your mobile and enterprise assets.

Q&A: Securing Your Mobile Environment

How to improve security for mobile users in light of new, complex technologies such as cloud computing.

Security: Data Disposal 101

According to a new study, more than half of U.S. businesses aren’t erasing data from computers or storage assets prior to retiring them.

Modern Antivirus, Whitelisting, and Enterprise Security

Whitelisting applications can be a more effective and lower-impact technique for protecting your enterprise than are traditional antivirus approaches.

A Tough Year that Could Have Been Worse

Security admins faced a host of vulnerabilities and new attacks in 2010, but the nightmare scenarios that could've kept security pros up at night blessedly didn't come to pass.

Q&A: Security in a Virtualized Environment

How are IT organizations responding to the new security challenges of administrative privileges in a virtualized environment?

Database Security: Why Patching Isn't Popular with DBAs

Database security patching is a tricky business. It's so tricky, in fact, that some DBAs prefer to rely on defense-in-depth controls to protect their systems.



Tracking Trends: Data Security Risks

The top three risk trends in 2010, and what lies ahead for security professionals in 2011.

Q&A: Identity and Access Management

What’s driving the interest in identity and access management, and how can you address the challenges the technology presents?

Microsoft Investigating Windows Proof-of-Concept Flaw

Microsoft says its security team is looking into an elevation-of-privilege exploit affecting Windows-based systems.

Microsoft Document Outlines Its Cloud Security Infrastructure

Microsoft's new white paper explains the organizational and standards-based underpinnings of its cloud security efforts.

A 3-Step Defense-in-Depth Strategy for Combating Cyberterrorism

Learn how a "defense-in-depth" strategy can provide greater protection to your enterprise.

Retailers Under Attack

An upsurge in retail-oriented phishing exploits underscores the growing menace posed by targeted attacks.

Microsoft Goes Easy With November Patch Release

Microsoft's November security update arrived today, and it's something less than a Thanksgiving meal.

New IE Zero-Day Attack Surfaces

In a security advisory, Microsoft is warning users of Internet Explorer vulnerability that could allow remote code execution by hackers.

Mid-Size Enterprises are Prime Targets

Mid-size shops are increasingly -- even disproportionately -- coming under attack by hackers, yet few security budgets are rising.

Q&A: IAM and the Unix/Linux Organization

Unix/Linux systems needn't be islands of identity; we show you the challenges and options for addressing authentication, provisioning, and security and take a closer look at Active Directory bridges.

Microsoft: Java Worse Than PDF as Security Threat

Java should be considered a top software security threat, even more so than Adobe PDF files, according to Microsoft's announcement.

The Less Productive Mobile Workforce

Mobile users are more likely to get themselves into trouble -- but not the kind you'd expect.

Microsoft Security Essentials Free for Small Businesses

Microsoft Security Essentials (MSE) will be free for small businesses to use "beginning in early October," Microsoft announced