The top trends security administrators dealt with in 2012 and what's ahead in 2013.
Is FTP losing out to file-sharing cloud services?
How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.
We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.
We examine policy considerations and how to manage security policy in a mixed environment.
Before you implement a next-generation firewall, follow these three tips to ensure project success.
A study of corporate e-mail and file transfer habits highlights security concerns.
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
Following these five rules will help your organization get your security keys under control.
Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.
Data is flowing as never before to the cloud, increasing enterprise data risks. We examine the security issues and best practices for keeping your data safe in the cloud.
Getting just the right mix of security and user friendliness at Movado.
To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.
From BYOD to social media, the trends that are keeping security administrators on their toes.
If you store, process, or transmit card account data, youmust comply with the PCI data security standard. We explore the basics, including why DevOps teams needs to be compliant.
In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.
SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.
VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.
Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.
IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.