How do you secure an environment in which risky behavior is business as usual?
Officials in the UK now suggest that a cyberattack from purported White House e-mail accounts actually originated from China, and the perpetrator used a hoax e-mail address that resembled a White House account.
How to take control of default group access permissions settings for Windows Server.
We outline seven steps that help you address the people aspect of data security.
Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.
Talk about post-Christmas letdowns: spam volumes tanked after December 25th. What happened -- and can it last?
Best practices for protecting your mobile and enterprise assets.
How to improve security for mobile users in light of new, complex technologies such as cloud computing.
According to a new study, more than half of U.S. businesses aren’t erasing data from computers or storage assets prior to retiring them.
Whitelisting applications can be a more effective and lower-impact technique for protecting your enterprise than are traditional antivirus approaches.
Security admins faced a host of vulnerabilities and new attacks in 2010, but the nightmare scenarios that could've kept security pros up at night blessedly didn't come to pass.
How are IT organizations responding to the new security challenges of administrative privileges in a virtualized environment?
Database security patching is a tricky business. It's so tricky, in fact, that some DBAs prefer to rely on defense-in-depth controls to protect their systems.
The top three risk trends in 2010, and what lies ahead for security professionals in 2011.
What’s driving the interest in identity and access management, and how can you address the challenges the technology presents?
Microsoft says its security team is looking into an elevation-of-privilege exploit affecting Windows-based systems.
Microsoft's new white paper explains the organizational and standards-based underpinnings of its cloud security efforts.
Learn how a "defense-in-depth" strategy can provide greater protection to your enterprise.
Microsoft's November security update arrived today, and it's something less than a Thanksgiving meal.
An upsurge in retail-oriented phishing exploits underscores the growing menace posed by targeted attacks.