Survey shows IT and security pros wary of potentially expensive cloud data breaches.
Trend Micro Inc. recently announced enhancements to its enterprise-wide security platform designed to provide a better unified threat defense against known attacks while also detecting and responding to new targeted attacks now in widespread use.
The top trends security administrators dealt with in 2012 and what's ahead in 2013.
How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.
To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.
From BYOD to social media, the trends that are keeping security administrators on their toes.
In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.
No single technology can enable a fully secure network. The three-layer model we present can guide your organization in making key improvements to your network security.
Thanks to the ubiquity of firewalls, security administrators have no shortage of options and solutions. We examine the state of firewall management in today's data center.
When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.
Conficker worm will continue to trouble IT despite lack of new variants in two years.
Malware, as Microsoft could have told Apple, comes with the territory. Last year saw a surge in Mac-related malware; 2012 has sustained that trend in a big way.
As Microsoft's response to a recent critical vulnerability demonstrates, Windows security has come a long way -- for the better -- since the days of Code Red.
New targeted attacks masquerade as legitimate correspondence from the Better Business Bureau. It's fiendishly clever, which is exactly the point.
Just how much of a problem is the RSA key kerfuffle? Two research teams weigh in about encryption schemes.
These four best practices will help government and political organizations mitigate the effects of DDoS attacks.
SSL and TSL are used to encrypt almost all sensitive communications traffic on the Internet.
A look at how security is evolving around three key information technology developments.
What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?
Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond?