Security: Data Protection


Firewalls Get Failing Marks; Enterprise Security Flunking, Too

Why does IT pass the buck to other internal groups when it comes to safeguarding enterprise security?

How Mobile Computing, Not Windows Desktop, Will Transform Cybercrime

As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.

Microsoft's March Security Update is Light

Contains only three fixes.

How to Secure Data in the Cloud and Beyond

Next-generation tokenization has the potential to help businesses protect sensitive data in the cloud in a more efficient and scalable manner than encryption and first-generation tokenization.

How Continuous Monitoring Can Help Financial Services Firms Avoid Cyber Attacks

Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.

DDoS Unbound

DDoS attacks are bigger and more frequent than ever, and a lack of insight into IPv6 security is particularly worrisome.

The Emerging Crimeware Market

The availability and sophistication of crimeware kits has contributed to the rapid evolution -- as well as the increasing sophistication -- of cybercrime itself.

7 Steps for Dealing with the People Component of Data Security

We outline seven steps that help you address the people aspect of data security.

New Year, New Threats: The Emerging Security Risks of Social Networking

Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.

Q&A: Data Protection Strategies for Mobile Computing

Best practices for protecting your mobile and enterprise assets.

Security: Data Disposal 101

According to a new study, more than half of U.S. businesses aren’t erasing data from computers or storage assets prior to retiring them.

Modern Antivirus, Whitelisting, and Enterprise Security

Whitelisting applications can be a more effective and lower-impact technique for protecting your enterprise than are traditional antivirus approaches.

A Tough Year that Could Have Been Worse

Security admins faced a host of vulnerabilities and new attacks in 2010, but the nightmare scenarios that could've kept security pros up at night blessedly didn't come to pass.

Q&A: Identity and Access Management

What’s driving the interest in identity and access management, and how can you address the challenges the technology presents?

Q&A: IAM and the Unix/Linux Organization

Unix/Linux systems needn't be islands of identity; we show you the challenges and options for addressing authentication, provisioning, and security and take a closer look at Active Directory bridges.

Latest Spam and Phishing Trends Revealed in Symantec Report

Spam dominates e-mail; phishing attacks mimic support chat sessions.

Q&A: The State of IT Security

Recommendations for making data safer that won’t decimate your IT budget.

Security Crackers Keep the Pressure On

With World Cup-oriented attacks and a brazen tech-support-by-phone scam, it's business as usual for the ever-creative information security crackers.

Q&A: The Shift in Data Breaches

Breaches are targeting application because that's where the data is.

Q&A: Securing Storage in the Cloud

Moving your data to the cloud is not without risk. Here's what you need to know about securing your data.