Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.
Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?
Best practices for keeping mobile devices safe.
The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?
Getting and staying connected was key to this Swiss insurance company, but Wi-Fi access meant it had to find a VPN solution.
Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.
What is IAM and how can you make an IAM project a success?
Getting a handle on UNIX vulnerabilities is no easy task.
Why does IT pass the buck to other internal groups when it comes to safeguarding enterprise security?
These tips can help you minimize mobile threats.
Who said hardware authentication tokens are infallible? CA's new program contrasts the advantages of its software-based approach with RSA Security's hardware-based SecurID model.
A new survey shows a disconnect between the security-first mentalities of auditors and the compliance-driven concerns of their employers.
Two security approaches, working in tandem, provide superior enterprise protection.
Nine out of ten enterprises say they plan to invest in new endpoint security technologies to help them better manage mobile devices
As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.
Contains only three fixes.
Next-generation tokenization has the potential to help businesses protect sensitive data in the cloud in a more efficient and scalable manner than encryption and first-generation tokenization.
DDoS attacks are bigger and more frequent than ever, and a lack of insight into IPv6 security is particularly worrisome.
Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.
The availability and sophistication of crimeware kits has contributed to the rapid evolution -- as well as the increasing sophistication -- of cybercrime itself.