Security


Study: Using Cloud Could Be Dangerous and Expensive

Survey shows IT and security pros wary of potentially expensive cloud data breaches.

Which Data Protection Is Right for You?

Due to the nature of data protection, what's right for one enterprise may not be right for yours. Here's some tips to consider when finding a solution to secure your data.

Trend Micro Announces Enterprise Endpoint Sensor Protection

Trend Micro Inc. recently announced enhancements to its enterprise-wide security platform designed to provide a better unified threat defense against known attacks while also detecting and responding to new targeted attacks now in widespread use.

Security Automation and Improved IT Processes in 2013

Look for these transforming trends in your network security in the coming year.

Ramsomware Poses New Threat to Users

A new exploit poses as law enforcement to trap users into paying to unlock their system What you need to know about the exploit and how to keep your users safe.

Making the Grade: 6 Data Protection Best Practices for Universities and Colleges

We explore the best practices that address the special needs of educational institutions.

Q&A: Public Cloud Security

What IT should do to secure data in the cloud.



Top 3 Trends for Cybersecurity in 2013

As cyber criminals get smarter and mobile malware continues to proliferate along with fraudulent devices, how can security teams effectively prepare for the sophisticated threats ahead?

Q&A: Taking a Risk-Based Approach to Security

Security is more than just determining which users have access to applications and data. Compliance also isn't enough. What's needed is a risk-based approach to security -- a pro-active, prevention-oriented line of attack to keep your enterprise safe.

IT Security: 2012 in Review, Predictions for 2013

The top trends security administrators dealt with in 2012 and what's ahead in 2013.

Q&A: Making File Transfers and Sharing More Secure

Is FTP losing out to file-sharing cloud services?

Keyloggers: The Most Dangerous Security Risk in Your Enterprise

How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.

SCADA Protocol Testing in Critical Infrastructure

We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.

More Tips for Next-Generation Firewalls: Security Policy Management

We examine policy considerations and how to manage security policy in a mixed environment.

3 Tips for Next-Generation Firewalls: Sizing and Deployment

Before you implement a next-generation firewall, follow these three tips to ensure project success.

Q&A: The State of Data Security, Compliance, and Why Your Company May Be at Risk

A study of corporate e-mail and file transfer habits highlights security concerns.

Q&A: Keeping Mobile Applications Secure

How can you make sure your mobile applications are secure? A security expert offers several suggestions.

5 Rules for Reining in Key Sprawl

Following these five rules will help your organization get your security keys under control.

Q&A: User Authentication Challenges, Best Practices, and the Future

Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.

Q&A: Securing Data in the Cloud

Data is flowing as never before to the cloud, increasing enterprise data risks. We examine the security issues and best practices for keeping your data safe in the cloud.