Network breaches top IT concerns
After a thick April patch, this month's security update, released today, is light with only two "critical" fixes.
We examine the remaining five challenges and how Active Directory provides a solution.
As more users need multiple identities to access the applications they need regularly, IT has its hands full maintaining security.
Cyber-attacking is no longer just a mischievous, if destructive, pastime: it's a business. A Symantec report confirms that business is booming.
More than a third of network devices examined showed signs of security vulnerabilities
Hackers have become increasingly organized and they have more targets
April patch includes a mechanism that avoids installing a Windows kernel fix in the presence of troublesome malware
No single solution can prevent all security risks in a virtualized data center, but automation can help.
What accounts for the near-disappearance of virus activity last month? One explanation: even spammers need to invest time in research and development.
To address the security risks of SSL, we look at how transparent SSL proxies work and how they are used in enterprises today.
Despite its name, Secure Sockets Layer isn't totally secure. We explain the risks that arise from increased use of SSL within enterprise networks.
The optimal solution for most companies looking to lower the operating expenses associated with an e-mail environment through virtualization is to deploy a hybrid approach.
Spam now accounts for close to 90 percent of all e-mail traffic.
We expose five security risks introduced by enterprise search and explain how you can protect your enterprise from these vulnerabilities.
Hyperguard SaaS Standard offers Web application security monitoring, detection-only, and protection modes.
Organizations may be under several misunderstandings about the safety of their e-mail attachments. We explore the risks and corrective action IT can take to reduce the vulnerabilities.
PDF has now supplanted another Adobe technology -- Flash -- as the exploit platform of choice for malicious hackers.
People must be able to trust the cloud, RSA president says.
Consumer data in vulnerable during development, testing.