Next-generation tokenization has the potential to help businesses protect sensitive data in the cloud in a more efficient and scalable manner than encryption and first-generation tokenization.
As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.
Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.
DDoS attacks are bigger and more frequent than ever, and a lack of insight into IPv6 security is particularly worrisome.
The availability and sophistication of crimeware kits has contributed to the rapid evolution -- as well as the increasing sophistication -- of cybercrime itself.
We outline seven steps that help you address the people aspect of data security.
Best practices for protecting your mobile and enterprise assets.
Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.
According to a new study, more than half of U.S. businesses aren’t erasing data from computers or storage assets prior to retiring them.
Whitelisting applications can be a more effective and lower-impact technique for protecting your enterprise than are traditional antivirus approaches.
Security admins faced a host of vulnerabilities and new attacks in 2010, but the nightmare scenarios that could've kept security pros up at night blessedly didn't come to pass.
What’s driving the interest in identity and access management, and how can you address the challenges the technology presents?
Unix/Linux systems needn't be islands of identity; we show you the challenges and options for addressing authentication, provisioning, and security and take a closer look at Active Directory bridges.
Spam dominates e-mail; phishing attacks mimic support chat sessions.
Recommendations for making data safer that won’t decimate your IT budget.
With World Cup-oriented attacks and a brazen tech-support-by-phone scam, it's business as usual for the ever-creative information security crackers.
Breaches are targeting application because that's where the data is.
Moving your data to the cloud is not without risk. Here's what you need to know about securing your data.
To address the security risks of SSL, we look at how transparent SSL proxies work and how they are used in enterprises today.
Despite its name, Secure Sockets Layer isn't totally secure. We explain the risks that arise from increased use of SSL within enterprise networks.