Security: Vulnerabilities


Study: Using Cloud Could Be Dangerous and Expensive

Survey shows IT and security pros wary of potentially expensive cloud data breaches.

Trend Micro Announces Enterprise Endpoint Sensor Protection

Trend Micro Inc. recently announced enhancements to its enterprise-wide security platform designed to provide a better unified threat defense against known attacks while also detecting and responding to new targeted attacks now in widespread use.

IT Security: 2012 in Review, Predictions for 2013

The top trends security administrators dealt with in 2012 and what's ahead in 2013.

Keyloggers: The Most Dangerous Security Risk in Your Enterprise

How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.

A CxO’s Guide to Understanding Today’s Most Dangerous Attacks

To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.

Top 5 Enterprise Security Trends

From BYOD to social media, the trends that are keeping security administrators on their toes.

How VM Introspection Transforms Honeynets into Lean, Mean, APT-fighting Machines

In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.

Tackling Today's Firewall Management Issues

Thanks to the ubiquity of firewalls, security administrators have no shortage of options and solutions. We examine the state of firewall management in today's data center.

The Network’s Role in Securing Cyberspace

No single technology can enable a fully secure network. The three-layer model we present can guide your organization in making key improvements to your network security.

Q&A: Cloud Security 101

When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.

Conficker Tops Security Concerns in Microsoft Security Report

Conficker worm will continue to trouble IT despite lack of new variants in two years.

Security Woes: Apple Hits the Big Time

Malware, as Microsoft could have told Apple, comes with the territory. Last year saw a surge in Mac-related malware; 2012 has sustained that trend in a big way.

RDP Fix Shows Microsoft's Smarter about Windows Security Updates

As Microsoft's response to a recent critical vulnerability demonstrates, Windows security has come a long way -- for the better -- since the days of Code Red.

The Latest in Fiendishly Clever Targeted Attack Types

New targeted attacks masquerade as legitimate correspondence from the Better Business Bureau. It's fiendishly clever, which is exactly the point.

The RSA Key Kerfuffle: Why Randomness Is Hard

Just how much of a problem is the RSA key kerfuffle? Two research teams weigh in about encryption schemes.

4 Best Practices for Mitigating DDoS Effects

These four best practices will help government and political organizations mitigate the effects of DDoS attacks.

Updated OpenSSL Libraries Patch Potential Information Disclosure, DoS Flaws

SSL and TSL are used to encrypt almost all sensitive communications traffic on the Internet.

How Mobile Cloud Will Make Security Priority #1

A look at how security is evolving around three key information technology developments.

Will Advanced Persistent Threats Grow in 2012?

What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?

Manage the Breach or the Breach Will Manage You

Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond?