Data protection challenges grow as data volumes grow. We examine the best practices IT can follow to maximize data protection.
What enterprises and IT must do to enhance their risk-management program.
Security consultancy AppRiver anticipates a new wave of spam and malware attacks focusing on job-hunting and professional networking sites.
How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.
Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
Why current security tools aren’t adequate, and what vendors and IT must do now to secure their environment.
All things considered, 2008 was a quiet but industrious year on the security front.
Employees who believe they may be fired may steal proprietary information to blackmail management
How deploying hardware in the data center that runs a centralized security suite that handles multiple security configurations can protect a diverse set of end users.
Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA
Virtualization brings a new set of security challenges.
Only 10 percent of organizations are actually using effective anti-spam technologies
Endpoints pose security risks to an enterprise, but identifying those endpoints can be IT's biggest challenge.
Best practices for managing groups in Active Directory.
Symantec spent more than half a billion dollars to buy its way into the SaaS e-mail and Web security segments
New research from Aberdeen shows how Best-in-Class companies are getting the most out of unified threat management technologies and services.
Why automated security policy management should be part of IT's overall data security compliance strategy.
McAfee's acquisition of Secure Computing could trigger a round of consolidation and disrupt the security status quo for vendors and customers alike
Why biometrics haven't been adopted faster
Choosing a security services provider can be tricky. We explain the key decisions and considerations you must make.