In 2012, businesses must align data security with customer value.
Of 13 items in release, 3 address remote code execution flaws.
For security administrators, RSA's disclosure of a hack was just one of many serious breaches that occurred in a very bad year.
Mainframes are typically more secure than most other platforms, but that doesn't mean IT can ignore them.
Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.
Think VPN makes for secure data access and transfer? Think again.
Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.
Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.
Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.
An introduction to the security requirements you should expect from a cloud service provider.
Silly or not, the Morto worm has caused a good bit of mischief.
Attacks are getting increasingly complicated -- not just in the technology they use but in the number of parties involved in a single attack.
A new report from security specialist McAfee warns that the information security sky is nigh on falling.
Neither iOS nor Android has been designed with enterprise security in mind. That makes securing them a challenging proposition.
Millions rely on traditional one-time password tokens. Here’s why your organization may want to replace or augment this approach for perimeter security.
Mobile devices are bombarded by direct attacks and those designed for any Web-connected device. We explain best practices for end users and best practices for IT that can protect against these attacks.
Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.
Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.
Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.
Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?