Survey shows IT and security pros wary of potentially expensive cloud data breaches.
Due to the nature of data protection, what's right for one enterprise may not be right for yours. Here's some tips to consider when finding a solution to secure your data.
Trend Micro Inc. recently announced enhancements to its enterprise-wide security platform designed to provide a better unified threat defense against known attacks while also detecting and responding to new targeted attacks now in widespread use.
A new exploit poses as law enforcement to trap users into paying to unlock their system What you need to know about the exploit and how to keep your users safe.
Look for these transforming trends in your network security in the coming year.
We explore the best practices that address the special needs of educational institutions.
What IT should do to secure data in the cloud.
As cyber criminals get smarter and mobile malware continues to proliferate along with fraudulent devices, how can security teams effectively prepare for the sophisticated threats ahead?
Security is more than just determining which users have access to applications and data. Compliance also isn't enough. What's needed is a risk-based approach to security -- a pro-active, prevention-oriented line of attack to keep your enterprise safe.
The top trends security administrators dealt with in 2012 and what's ahead in 2013.
Is FTP losing out to file-sharing cloud services?
How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.
We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.
We examine policy considerations and how to manage security policy in a mixed environment.
Before you implement a next-generation firewall, follow these three tips to ensure project success.
A study of corporate e-mail and file transfer habits highlights security concerns.
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
Following these five rules will help your organization get your security keys under control.
Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.
Data is flowing as never before to the cloud, increasing enterprise data risks. We examine the security issues and best practices for keeping your data safe in the cloud.