New Regulations Bring Advancements in Data Governance

As critical unstructured data grows exponentially amid a variety of data privacy laws, organizations are turning to data governance automation.

Batten Down the Hatches on IBM i

Just because you can't name the last IBM i-specific security issue doesn't mean your IBM i platform is secure.

Q&A: IT Risk and Security Management

A recent breach in Utah once again raises the need for IT to implement IT risk and security management on servers. What's holding IT back?

Q&A: Cloud Security 101

When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.

Conficker Tops Security Concerns in Microsoft Security Report

Conficker worm will continue to trouble IT despite lack of new variants in two years.

Security Woes: Apple Hits the Big Time

Malware, as Microsoft could have told Apple, comes with the territory. Last year saw a surge in Mac-related malware; 2012 has sustained that trend in a big way.

Eye on Security: More Devices, More Data Points, Fewer Security Holes: Advanced Security Integration

Innovative, multi-level authentication measures are critical. Companies that use inventive ways to incorporate current technology to safeguard their information will ultimately come out on top.

Q&A: Setting Up a Second Line of Defense

Organizations will have to accept that their gates will be breached and begin preparing their second line of defense -- data platforms -- to mitigate the damage caused by attacks that get through.

The Undervalued Security Benefits of IPsec

IPsec is a secure, robust, and transparent network widely available to businesses with smaller overhead than you might think.

RDP Fix Shows Microsoft's Smarter about Windows Security Updates

As Microsoft's response to a recent critical vulnerability demonstrates, Windows security has come a long way -- for the better -- since the days of Code Red.

Eye on Security: Integrating Physical and Cyber Security

We explore the benefits of interconnecting physical and cyber security.

The Latest in Fiendishly Clever Targeted Attack Types

New targeted attacks masquerade as legitimate correspondence from the Better Business Bureau. It's fiendishly clever, which is exactly the point.

The RSA Key Kerfuffle: Why Randomness Is Hard

Just how much of a problem is the RSA key kerfuffle? Two research teams weigh in about encryption schemes.

A 3-Step, Least-Risk Approach to Securing Windows 7

A best-practices approach and advice for securing your Windows 7 environment.

Q&A: Managing Endpoints and Mobile Devices

Mobile devices are just one of a number of assets that must be managed. Fortunately, the cloud can help.

Cloud, Mobile, and the Fed: How the Government is Shaping Open Identity

Changing identity and access management needs are pressuring IT to revise its security strategies. Why is the federal government involved?

4 Best Practices for Mitigating DDoS Effects

These four best practices will help government and political organizations mitigate the effects of DDoS attacks.

Supporting BYOD with Strong Mobile Device Management Policies

How to make mobile device management a core part of your security management strategy.

Updated OpenSSL Libraries Patch Potential Information Disclosure, DoS Flaws

SSL and TSL are used to encrypt almost all sensitive communications traffic on the Internet.

How Mobile Cloud Will Make Security Priority #1

A look at how security is evolving around three key information technology developments.