The optimal solution for most companies looking to lower the operating expenses associated with an e-mail environment through virtualization is to deploy a hybrid approach.
Spam now accounts for close to 90 percent of all e-mail traffic.
We expose five security risks introduced by enterprise search and explain how you can protect your enterprise from these vulnerabilities.
Hyperguard SaaS Standard offers Web application security monitoring, detection-only, and protection modes.
Organizations may be under several misunderstandings about the safety of their e-mail attachments. We explore the risks and corrective action IT can take to reduce the vulnerabilities.
PDF has now supplanted another Adobe technology -- Flash -- as the exploit platform of choice for malicious hackers.
People must be able to trust the cloud, RSA president says.
Consumer data in vulnerable during development, testing.
Security too often is taken on trust, report says.
Is IT winning the battle against spam, or was a recent drop in malware and phishing volumes just a statistical blip in an otherwise upward trend?
A prominent security firm says that the security features of both Windows 7 and Mac OS aren't quite up to snuff.
Global study of security personnel identifies goals, points out risks and staffing issues
Study lists oversights that can lead to denial-of-service attacks, data theft, or control of a system by hackers.
Protecting the network is no longer enough. IT needs a watchdog to protect databases from external breaches and internal sabotage.
The security challenges and mitigation strategies to help you migrate your enterprise applications to the cloud while ensuring your data’s safety.
Where is cybersecurity headed? We look at how regulation, social networking, and popular technologies (such as cloud computing) will impact your enterprise’s security management.
Asset management software can complement your current security tools to provide more complete desktop security.
IT organizations are highly exposed to security breaches through their information worker's mobile devices.
CA’s chief security architect discusses the three key areas for security professional’s attention this year.
IT shops aren't doing enough to secure their cellular communications. This leaves them wide open to attack. The stakes are high -- and likely to get even higher.