Survey shows IT and security pros wary of potentially expensive cloud data breaches.
Trend Micro Inc. recently announced enhancements to its enterprise-wide security platform designed to provide a better unified threat defense against known attacks while also detecting and responding to new targeted attacks now in widespread use.
We explore the best practices that address the special needs of educational institutions.
The top trends security administrators dealt with in 2012 and what's ahead in 2013.
Is FTP losing out to file-sharing cloud services?
How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.
We examine policy considerations and how to manage security policy in a mixed environment.
Before you implement a next-generation firewall, follow these three tips to ensure project success.
Following these five rules will help your organization get your security keys under control.
Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.
Data is flowing as never before to the cloud, increasing enterprise data risks. We examine the security issues and best practices for keeping your data safe in the cloud.
To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.
IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.
A look at the true cost of compliance failures and how to avoid being buried in trouble.
Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.
Thanks to the ubiquity of firewalls, security administrators have no shortage of options and solutions. We examine the state of firewall management in today's data center.
Big data and cloud computing are two top-of-mind technologies. What benefits can IT enjoy by bringing them together?
As critical unstructured data grows exponentially amid a variety of data privacy laws, organizations are turning to data governance automation.
Just because you can't name the last IBM i-specific security issue doesn't mean your IBM i platform is secure.
A recent breach in Utah once again raises the need for IT to implement IT risk and security management on servers. What's holding IT back?