Increasingly, hackers have infiltrated "protected" enterprise networks. One NAC provider says the key to maximizing your protection is to know what’s on your network.
In the first part of our three-part series about network access/admission control, we examine key technologies and issues so you can choose the right NAC solution for your network.
IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.
A new product provides enterprises with a risk assessment analysis that keeps everyone informed.
New IBM initiatives target hackers and insider threats in a single, complete security platform.
New study shows disconnect between executives' understanding and action
If you’re only as secure as your weakest link, printers could be your biggest threat.
Guarding against external threats is important, but don’t overlook legacy systems security.
To reverse the rise of Web-application vulnerabilities, enterprises must patch more than just their operating systems.
Three key features IT should look for when shopping for a UTM solution.
EdgeSecure makes it easier to protect data stored in remote locations.
Protecting mission-critical data means looking at port and USB vulnerabilities.
Broken lock: $25. Stolen laptop: $1,500. The cost of corporate data breach: Priceless. Learn how to deploy resources and leadership to most effectively deal with the aftermath of sensitive data exposure.
V.i. Laboratories promises that CodeArmor can application code from piracy and reverse engineering
As expected, Microsoft released three patches last week to fix one critical Office vulnerability as well as two Windows flaws.
When it comes to malware, one company says their product separates the wheat from the chaff, advising enterprises which files should and shouldn’t be on their systems.
TCO matters in the embedded marketplace; hardware integration is the key.
XML security is where it’s at for adopters of service-oriented architectures
How to protect your organization from the most prevalent insider threat: legitimate users with access to confidential information
After protecting an enterprise from common virus attacks, IT must now protect its online applications.