We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
From BYOD to social media, the trends that are keeping security administrators on their toes.
SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.
Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.
Mobile devices are just one of a number of assets that must be managed. Fortunately, the cloud can help.
How to make mobile device management a core part of your security management strategy.
Silly or not, the Morto worm has caused a good bit of mischief.
Neither iOS nor Android has been designed with enterprise security in mind. That makes securing them a challenging proposition.
Mobile devices are bombarded by direct attacks and those designed for any Web-connected device. We explain best practices for end users and best practices for IT that can protect against these attacks.
Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.
Best practices for keeping mobile devices safe.
These tips can help you minimize mobile threats.
Nine out of ten enterprises say they plan to invest in new endpoint security technologies to help them better manage mobile devices
As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.
DDoS attacks are bigger and more frequent than ever, and a lack of insight into IPv6 security is particularly worrisome.
How to improve security for mobile users in light of new, complex technologies such as cloud computing.
Security admins faced a host of vulnerabilities and new attacks in 2010, but the nightmare scenarios that could've kept security pros up at night blessedly didn't come to pass.
Mobile users are more likely to get themselves into trouble -- but not the kind you'd expect.
Recommendations for making data safer that won’t decimate your IT budget.