Where should IT focus its attention in protecting network assets, what investments offer the best return, and how can IT to avoid common mistakes when developing its security strategy?
In the online banking segment, some industry watchers warn, the bad guys are winning the war against unsuspecting account holders.
Where should IT focus its attention in protecting network assets, what investments offer the best return, and how can IT to avoid common mistakes when developing its security strategy?
A new report from McAfee underscores that if users are successfully initiating celebrity-themed Web searches, IT hasn’t done its job.
These five best practices will help deliver success more rapidly and ensure increasing return on investment.
Attackers are unearthing old exploits -- in the case of the infamous CodeRed worm, extremely old exploits -- to wreak havoc on businesses and consumers.
Far from being exemplary of the state-of-the-art in cyber warfare, July’s DDoS attacks were exemplary of something else: the state-of-the-mundane.
Although considerable sweat and tears have gone into data protection standards, it's time to spur discussion about how our data protection thinking and schemes might benefit from new ideas and technologies.
Recent FTP thefts affecting even SSL-encrypted logins are the work of a new Trojan called Zeus; 90,000 logins may have been compromised.
Creating a holistic, enterprise-wide security approach is a daunting task. These tips can make it easier.
Experts say a recent accord between Fortify and HP augurs the advent of a new approach to vulnerability detection.
Threats delivered through the Web are increasing in number and severity. A Web filtering solution can reduce an enterprise’s vulnerability.
A recent report by AirTight Networks finds financial services firms are all but throwing out a welcome mat to wireless attacker
P2P file sharing is on the rise, and so are its risks. We show you five tips that can help you select a secure enterprise file-transfer solution.
To effectively address new security challenges, IT organizations need to tighten coordination and integration between security.
Phishing activity increased by almost 40 percent in a 12 month period.
What you can do now to stay a step ahead of the changing vulnerability landscape.
A new report shines light on Web-based attacks, concluding that -- in terms of both volume and variety -- they pose a significant, and significantly expanding, threat.
Spammers are tweaking their messaging to better exploit recession-related fear, uncertainty, and doubt
How an enterprise’s culture affects its IT security