Securing a Virtualized E-mail System

The optimal solution for most companies looking to lower the operating expenses associated with an e-mail environment through virtualization is to deploy a hybrid approach.

IT Losing the War Against Spam

Spam now accounts for close to 90 percent of all e-mail traffic.

The Security Risks of Enterprise Search

We expose five security risks introduced by enterprise search and explain how you can protect your enterprise from these vulnerabilities.

Art of Defence Extends Distributed Web Application Firewall to the Cloud

Hyperguard SaaS Standard offers Web application security monitoring, detection-only, and protection modes.

E-mail Attachments: Misperceptions That Can Compromise Security

Organizations may be under several misunderstandings about the safety of their e-mail attachments. We explore the risks and corrective action IT can take to reduce the vulnerabilities.

RSA Keynote: Cloud's Future Depends on Security

People must be able to trust the cloud, RSA president says.

PDF Payloads Increasingly Pack Malicious Punch

PDF has now supplanted another Adobe technology -- Flash -- as the exploit platform of choice for malicious hackers.

Study Spotlights Privacy, Data Security Vulnerabilities at Financial Services Firms

Consumer data in vulnerable during development, testing.

RSA: Report Reveals 7 Cloud Computing "Sins"

Security too often is taken on trust, report says.

MessageLabs Reports (Slightly) Good News for Security Administrators

Is IT winning the battle against spam, or was a recent drop in malware and phishing volumes just a statistical blip in an otherwise upward trend?

A Desktop Operating System Security Report Card

A prominent security firm says that the security features of both Windows 7 and Mac OS aren't quite up to snuff.

Security Tops IT's Concerns, Symantec Study Finds

Global study of security personnel identifies goals, points out risks and staffing issues

Report Profiles Top Software Security Coding Errors

Study lists oversights that can lead to denial-of-service attacks, data theft, or control of a system by hackers.

Guarding the Information Treasure Chest: Databases and Data Breaches

Protecting the network is no longer enough. IT needs a watchdog to protect databases from external breaches and internal sabotage.

Enterprise Applications in the Cloud: A SaaS Security Perspective

The security challenges and mitigation strategies to help you migrate your enterprise applications to the cloud while ensuring your data’s safety.

Q&A: Assessing Cybersecurity's Past, Planning for the Future

Where is cybersecurity headed? We look at how regulation, social networking, and popular technologies (such as cloud computing) will impact your enterprise’s security management.

Why IT Asset Management is Critical to Your Network Security

Asset management software can complement your current security tools to provide more complete desktop security.

The Sleeper Cellular Issue

IT organizations are highly exposed to security breaches through their information worker's mobile devices.

Security Focus in 2010: Internal Threats, Cloud Computing, and Mobile Devices

CA’s chief security architect discusses the three key areas for security professional’s attention this year.

Security Trends in 2010

Security will continue to be a hot-button issue this year. Here’s how to protect your business-critical information.