Mobile security products fared better than did the broader security market in a very tough 2009. Look for that trend to continue.
Moving your data to the cloud is not without risk. Here's what you need to know about securing your data.
Microsoft has confirmed that it has been working with a security firm investigating a fundamental flaw in antivirus (AV) software for Windows.
When it comes to securing the increasingly virtualized systems of the 21st century, IT seems to be stuck in 20th-century mode.
Compliance efforts will also affect the security of your data. We explore the connection and what IT can do to protect its information assets.
Network breaches top IT concerns
After a thick April patch, this month's security update, released today, is light with only two "critical" fixes.
We examine the remaining five challenges and how Active Directory provides a solution.
As more users need multiple identities to access the applications they need regularly, IT has its hands full maintaining security.
Cyber-attacking is no longer just a mischievous, if destructive, pastime: it's a business. A Symantec report confirms that business is booming.
More than a third of network devices examined showed signs of security vulnerabilities
Hackers have become increasingly organized and they have more targets
April patch includes a mechanism that avoids installing a Windows kernel fix in the presence of troublesome malware
No single solution can prevent all security risks in a virtualized data center, but automation can help.
What accounts for the near-disappearance of virus activity last month? One explanation: even spammers need to invest time in research and development.
To address the security risks of SSL, we look at how transparent SSL proxies work and how they are used in enterprises today.
Despite its name, Secure Sockets Layer isn't totally secure. We explain the risks that arise from increased use of SSL within enterprise networks.
The optimal solution for most companies looking to lower the operating expenses associated with an e-mail environment through virtualization is to deploy a hybrid approach.
Spam now accounts for close to 90 percent of all e-mail traffic.
We expose five security risks introduced by enterprise search and explain how you can protect your enterprise from these vulnerabilities.