-
Consumer data in vulnerable during development, testing.
-
People must be able to trust the cloud, RSA president says.
-
Computer Online Forensic Evidence Extractor distributed on "pirate" sites.
-
A new survey by Symantec of 1000 organizations in the U.S. and Europe highlights the rise in security risks and actual damage done
-
Hackers are increasingly attempting to influence search engines to misdirect users to spurious Web sites
-
ID fraud spiked last year by almost a quarter, yet the total amount bilked by ID thieves rose only slightly.
-
By
If you’re looking to breathe extra life into your fleet of PCs and to keep your network as secure as possible, make sure you’re using a secure Web filter.
-
By
To successfully address weaknesses in current e-mail security, IT departments can take six proactive steps now to help their enterprises meet compliance regulations and prevent e-mail misuse.
-
One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users
-
We look at the purpose and best use of groups and roles.
-
By
Why now is not the time to cut security budgets.
-
Data protection challenges grow as data volumes grow. We examine the best practices IT can follow to maximize data protection.
-
By
What enterprises and IT must do to enhance their risk-management program.
-
Security consultancy AppRiver anticipates a new wave of spam and malware attacks focusing on job-hunting and professional networking sites.
-
By
How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.
-
Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
-
Why current security tools aren’t adequate, and what vendors and IT must do now to secure their environment.
-
All things considered, 2008 was a quiet but industrious year on the security front.
-
Employees who believe they may be fired may steal proprietary information to blackmail management
-
By
How deploying hardware in the data center that runs a centralized security suite that handles multiple security configurations can protect a diverse set of end users.
-
Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA
-
An out-of-band security fix from Microsoft put administrators in a familiar but tough spot: potentially damned if they patched and damned if they didn't.
-
Virtualization brings a new set of security challenges.
-
Only 10 percent of organizations are actually using effective anti-spam technologies
-
Endpoints pose security risks to an enterprise, but identifying those endpoints can be IT's biggest challenge.