Sleeping laptops may be the next way hackers steal encrypted information
We’ve all attached a file to an e-mail, but enterprises need a way to transfer large files securely. To explain the requirements, approaches, and options, we spoke with Ellen Ohlenbusch at GlobalSCAPE
ID theft usually involves time-tested methods such as telephone fraud than blockbuster data breaches
The number of new vulnerabilities disclosed by researchers actually declined in 2007 -- the first time that’s happened since 2003 -- but it’s not all good news.
In an age of Sarbanes-Oxley and similar regulatory measures, how could a single rogue trader have racked up more than $7 billion in losses?
After you’ve protected your environment from outside threats such as viruses, it’s time to turn your attention inward and protect against threats from your employees themselves.
Why organizations need to get serious about security awareness training
With mobile security, the devil you don’t know can hurt you much more than the devil you think you know
It's time to finally get serious about locking down IM
Multiple, overlapping, and mutually supportive defensive systems and patched, up-to-date systems can help consumers and businesses take advantage of the Internet while avoiding its dangers.
It’s been a tough year for protecting the enterprise. We review a security expert’s predictions for 2007, explore what’s been driving the rash of new vulnerabilities, and look ahead with him to the security problems that will dominate 2008.
Will it be "same old, same old" in security for 2008?
A new report from the IT Policy Compliance Group examined leaders and laggards to identify core competencies and steps to improve data protection.
Compliance applies to the entire infrastructure, even the many crannies of heterogeneous environments.
Industry standards and trusted hardware keep out unauthorized users and equipment
In the second of three parts, unifying security, compliance, and risk assessment get better results
In this first part of a three-part series, we look at how compliance continues to change IT security and response to risk
Can products such as Lancope’s Stealthflow spot security problems and network bottlenecks?
Security information and event management (SIEM) can help administrators track security data in a networked environment and counter potential threats.
New versions more about people than features.