Mobile Computing's Tipping Point

Mobile security products fared better than did the broader security market in a very tough 2009. Look for that trend to continue.

Q&A: Securing Storage in the Cloud

Moving your data to the cloud is not without risk. Here's what you need to know about securing your data.

Study Targets Windows "Hooking" in Antivirus Software

Microsoft has confirmed that it has been working with a security firm investigating a fundamental flaw in antivirus (AV) software for Windows.

Security Blindsided by Virtualization

When it comes to securing the increasingly virtualized systems of the 21st century, IT seems to be stuck in 20th-century mode.

Q&A: Why Compliance is the Best Friend and Worst Enemy of Good Security

Compliance efforts will also affect the security of your data. We explore the connection and what IT can do to protect its information assets.

Top IT Security Concerns Voiced in Survey

Network breaches top IT concerns

Microsoft's May Patch Aims at Office Vulnerabilities

After a thick April patch, this month's security update, released today, is light with only two "critical" fixes.

Top 10 IAM Challenges for Heterogeneous Enterprises -- Part 2 of 2

We examine the remaining five challenges and how Active Directory provides a solution.

Top 10 IAM Challenges for Heterogeneous Enterprises -- Part 1 of 2

As more users need multiple identities to access the applications they need regularly, IT has its hands full maintaining security.

Symantec Report Shows Cyber-Crime is Booming Business

Cyber-attacking is no longer just a mischievous, if destructive, pastime: it's a business. A Symantec report confirms that business is booming.

Network Device Vulnerabilities High, Study Shows

More than a third of network devices examined showed signs of security vulnerabilities

Web Security Threats on the Rise, Report Finds

Hackers have become increasingly organized and they have more targets

Privileged Access in the Virtualized Data Center: How to Reduce Security Risks and Ensure Business Resiliency

No single solution can prevent all security risks in a virtualized data center, but automation can help.

Windows Kernel Patch Sidesteps Rootkit Infections

April patch includes a mechanism that avoids installing a Windows kernel fix in the presence of troublesome malware

Virus Activity Drop: Calm Before a Stormy Summer?

What accounts for the near-disappearance of virus activity last month? One explanation: even spammers need to invest time in research and development.

Removing the Risks of SSL -- Part 2 of 2

To address the security risks of SSL, we look at how transparent SSL proxies work and how they are used in enterprises today.

Securing a Virtualized E-mail System

The optimal solution for most companies looking to lower the operating expenses associated with an e-mail environment through virtualization is to deploy a hybrid approach.

Removing the Risks of SSL -- Part 1 of 2

Despite its name, Secure Sockets Layer isn't totally secure. We explain the risks that arise from increased use of SSL within enterprise networks.

IT Losing the War Against Spam

Spam now accounts for close to 90 percent of all e-mail traffic.

The Security Risks of Enterprise Search

We expose five security risks introduced by enterprise search and explain how you can protect your enterprise from these vulnerabilities.