Hackers have become increasingly organized and they have more targets
April patch includes a mechanism that avoids installing a Windows kernel fix in the presence of troublesome malware
No single solution can prevent all security risks in a virtualized data center, but automation can help.
What accounts for the near-disappearance of virus activity last month? One explanation: even spammers need to invest time in research and development.
To address the security risks of SSL, we look at how transparent SSL proxies work and how they are used in enterprises today.
Despite its name, Secure Sockets Layer isn't totally secure. We explain the risks that arise from increased use of SSL within enterprise networks.
The optimal solution for most companies looking to lower the operating expenses associated with an e-mail environment through virtualization is to deploy a hybrid approach.
Spam now accounts for close to 90 percent of all e-mail traffic.
We expose five security risks introduced by enterprise search and explain how you can protect your enterprise from these vulnerabilities.
Hyperguard SaaS Standard offers Web application security monitoring, detection-only, and protection modes.
Organizations may be under several misunderstandings about the safety of their e-mail attachments. We explore the risks and corrective action IT can take to reduce the vulnerabilities.
PDF has now supplanted another Adobe technology -- Flash -- as the exploit platform of choice for malicious hackers.
People must be able to trust the cloud, RSA president says.
Consumer data in vulnerable during development, testing.
Security too often is taken on trust, report says.
Is IT winning the battle against spam, or was a recent drop in malware and phishing volumes just a statistical blip in an otherwise upward trend?
A prominent security firm says that the security features of both Windows 7 and Mac OS aren't quite up to snuff.
Global study of security personnel identifies goals, points out risks and staffing issues
Study lists oversights that can lead to denial-of-service attacks, data theft, or control of a system by hackers.
Protecting the network is no longer enough. IT needs a watchdog to protect databases from external breaches and internal sabotage.