A recent breach in Utah once again raises the need for IT to implement IT risk and security management on servers. What's holding IT back?
Just because you can't name the last IBM i-specific security issue doesn't mean your IBM i platform is secure.
When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.
Innovative, multi-level authentication measures are critical. Companies that use inventive ways to incorporate current technology to safeguard their information will ultimately come out on top.
Organizations will have to accept that their gates will be breached and begin preparing their second line of defense -- data platforms -- to mitigate the damage caused by attacks that get through.
As Microsoft's response to a recent critical vulnerability demonstrates, Windows security has come a long way -- for the better -- since the days of Code Red.
These four best practices will help government and political organizations mitigate the effects of DDoS attacks.
How to make mobile device management a core part of your security management strategy.
What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?
In 2012, businesses must align data security with customer value.
For security administrators, RSA's disclosure of a hack was just one of many serious breaches that occurred in a very bad year.
Think VPN makes for secure data access and transfer? Think again.
Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.
Silly or not, the Morto worm has caused a good bit of mischief.
Attacks are getting increasingly complicated -- not just in the technology they use but in the number of parties involved in a single attack.
Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.
Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?
Getting and staying connected was key to this Swiss insurance company, but Wi-Fi access meant it had to find a VPN solution.
The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?
Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.