Before you implement a next-generation firewall, follow these three tips to ensure project success.
A study of corporate e-mail and file transfer habits highlights security concerns.
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
Following these five rules will help your organization get your security keys under control.
Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.
Data is flowing as never before to the cloud, increasing enterprise data risks. We examine the security issues and best practices for keeping your data safe in the cloud.
Getting just the right mix of security and user friendliness at Movado.
To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.
From BYOD to social media, the trends that are keeping security administrators on their toes.
If you store, process, or transmit card account data, youmust comply with the PCI data security standard. We explore the basics, including why DevOps teams needs to be compliant.
SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.
In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.
VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.
Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.
IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.
A look at the true cost of compliance failures and how to avoid being buried in trouble.
Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.
Thanks to the ubiquity of firewalls, security administrators have no shortage of options and solutions. We examine the state of firewall management in today's data center.
No single technology can enable a fully secure network. The three-layer model we present can guide your organization in making key improvements to your network security.
Big data and cloud computing are two top-of-mind technologies. What benefits can IT enjoy by bringing them together?