Breaches could still be avoided, report notes.
Organizations are typically targeted by more than one successful cyber criminal attack each week -- costing the average organization $3.8 million.
Confusion about the efficacy of SAS 70 seems to be more the rule than the exception. A new report suggests that a SAS 70 reality check is long overdue.
Sorting through legacy permissions can seem daunting; these suggestions will help you manage the project.
How to ensure security is part of the cloud adoption strategy.
Recommendations for making data safer that won’t decimate your IT budget.
Breaches are targeting application because that's where the data is.
How IT can address the challenges of Active Directory
Microsoft has confirmed that it has been working with a security firm investigating a fundamental flaw in antivirus (AV) software for Windows.
When it comes to securing the increasingly virtualized systems of the 21st century, IT seems to be stuck in 20th-century mode.
We examine the remaining five challenges and how Active Directory provides a solution.
As more users need multiple identities to access the applications they need regularly, IT has its hands full maintaining security.
Cyber-attacking is no longer just a mischievous, if destructive, pastime: it's a business. A Symantec report confirms that business is booming.
More than a third of network devices examined showed signs of security vulnerabilities
April patch includes a mechanism that avoids installing a Windows kernel fix in the presence of troublesome malware
No single solution can prevent all security risks in a virtualized data center, but automation can help.
What accounts for the near-disappearance of virus activity last month? One explanation: even spammers need to invest time in research and development.
To address the security risks of SSL, we look at how transparent SSL proxies work and how they are used in enterprises today.
Despite its name, Secure Sockets Layer isn't totally secure. We explain the risks that arise from increased use of SSL within enterprise networks.
The optimal solution for most companies looking to lower the operating expenses associated with an e-mail environment through virtualization is to deploy a hybrid approach.