How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.
Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
Why current security tools aren’t adequate, and what vendors and IT must do now to secure their environment.
All things considered, 2008 was a quiet but industrious year on the security front.
Employees who believe they may be fired may steal proprietary information to blackmail management
How deploying hardware in the data center that runs a centralized security suite that handles multiple security configurations can protect a diverse set of end users.
Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA
An out-of-band security fix from Microsoft put administrators in a familiar but tough spot: potentially damned if they patched and damned if they didn't.
Virtualization brings a new set of security challenges.
Only 10 percent of organizations are actually using effective anti-spam technologies
Endpoints pose security risks to an enterprise, but identifying those endpoints can be IT's biggest challenge.
Best practices for managing groups in Active Directory.
Symantec spent more than half a billion dollars to buy its way into the SaaS e-mail and Web security segments
New research from Aberdeen shows how Best-in-Class companies are getting the most out of unified threat management technologies and services.
Why automated security policy management should be part of IT's overall data security compliance strategy.
McAfee's acquisition of Secure Computing could trigger a round of consolidation and disrupt the security status quo for vendors and customers alike
Why biometrics haven't been adopted faster
Choosing a security services provider can be tricky. We explain the key decisions and considerations you must make.
A new survey shows that enterprise networking groups -- not IT security pros -- are usually responsible for day-to-day NAC administration.
Why IT must adopt an information-centric view of security.