Microsoft recently announced its Azure Key Vault service is available for commercial use.
Security is more than just determining which users have access to applications and data. Compliance also isn't enough. What's needed is a risk-based approach to security -- a pro-active, prevention-oriented line of attack to keep your enterprise safe.
How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.
We examine policy considerations and how to manage security policy in a mixed environment.
Before you implement a next-generation firewall, follow these three tips to ensure project success.
A study of corporate e-mail and file transfer habits highlights security concerns.
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
Following these five rules will help your organization get your security keys under control.
Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.
Getting just the right mix of security and user friendliness at Movado.
From BYOD to social media, the trends that are keeping security administrators on their toes.
If you store, process, or transmit card account data, youmust comply with the PCI data security standard. We explore the basics, including why DevOps teams needs to be compliant.
SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.
In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.
VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.
A look at the true cost of compliance failures and how to avoid being buried in trouble.
Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.
Thanks to the ubiquity of firewalls, security administrators have no shortage of options and solutions. We examine the state of firewall management in today's data center.
No single technology can enable a fully secure network. The three-layer model we present can guide your organization in making key improvements to your network security.
Big data and cloud computing are two top-of-mind technologies. What benefits can IT enjoy by bringing them together?