A recent breach in Utah once again raises the need for IT to implement IT risk and security management on servers. What's holding IT back?
When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.
Conficker worm will continue to trouble IT despite lack of new variants in two years.
Malware, as Microsoft could have told Apple, comes with the territory. Last year saw a surge in Mac-related malware; 2012 has sustained that trend in a big way.
Innovative, multi-level authentication measures are critical. Companies that use inventive ways to incorporate current technology to safeguard their information will ultimately come out on top.
Organizations will have to accept that their gates will be breached and begin preparing their second line of defense -- data platforms -- to mitigate the damage caused by attacks that get through.
IPsec is a secure, robust, and transparent network widely available to businesses with smaller overhead than you might think.
As Microsoft's response to a recent critical vulnerability demonstrates, Windows security has come a long way -- for the better -- since the days of Code Red.
We explore the benefits of interconnecting physical and cyber security.
New targeted attacks masquerade as legitimate correspondence from the Better Business Bureau. It's fiendishly clever, which is exactly the point.
Just how much of a problem is the RSA key kerfuffle? Two research teams weigh in about encryption schemes.
A best-practices approach and advice for securing your Windows 7 environment.
Mobile devices are just one of a number of assets that must be managed. Fortunately, the cloud can help.
Changing identity and access management needs are pressuring IT to revise its security strategies. Why is the federal government involved?
These four best practices will help government and political organizations mitigate the effects of DDoS attacks.
How to make mobile device management a core part of your security management strategy.
SSL and TSL are used to encrypt almost all sensitive communications traffic on the Internet.
A look at how security is evolving around three key information technology developments.
What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?
Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond?