Unix/Linux systems needn't be islands of identity; we show you the challenges and options for addressing authentication, provisioning, and security and take a closer look at Active Directory bridges.
Java should be considered a top software security threat, even more so than Adobe PDF files, according to Microsoft's announcement.
Mobile users are more likely to get themselves into trouble -- but not the kind you'd expect.
Microsoft Security Essentials (MSE) will be free for small businesses to use "beginning in early October," Microsoft announced
Internet Explorer 9, released in beta form, doesn't talk to strangers
A controversial new report shows vendors are leaving enterprises seriously exposed.
Today's security market differs greatly from the market that was hammered almost a decade ago, following the dot.com implosion.
Four questions that promote security and regulatory compliance in your enterprise
A vulnerability Microsoft has confirmed is being exploited, and the software giant says it can't fix the problem with a simple update.
Spam dominates e-mail; phishing attacks mimic support chat sessions.
Microsoft on Friday issued an update of its Security Compliance Manager tool, which helps IT pros set security policies for some Microsoft software.
Blockbuster deal will let Intel provide hardware-based security.
Among the oft-cited weaknesses in using passwords for authentication are that people choose bad, easily guessed passwords, such as "123456" or "password"
Breaches could still be avoided, report notes.
Microsoft issued even more details about Windows security concerns, even after releasing its August security update on Tuesday
Organizations are typically targeted by more than one successful cyber criminal attack each week -- costing the average organization $3.8 million.
As the largest patch in Microsoft's Patch Tuesday history looms, the plot thickens.
Search giant Google and the U.S. Central Intelligence Agency are investing in a company working to track Web-browsing behavior
Confusion about the efficacy of SAS 70 seems to be more the rule than the exception. A new report suggests that a SAS 70 reality check is long overdue.
Sorting through legacy permissions can seem daunting; these suggestions will help you manage the project.