ID fraud spiked last year by almost a quarter, yet the total amount bilked by ID thieves rose only slightly.
Security vendors are stepping up their efforts to close the gap between security and operations
Data protection challenges grow as data volumes grow. We examine the best practices IT can follow to maximize data protection.
Security consultancy AppRiver anticipates a new wave of spam and malware attacks focusing on job-hunting and professional networking sites.
Why current security tools aren’t adequate, and what vendors and IT must do now to secure their environment.
All things considered, 2008 was a quiet but industrious year on the security front.
Employees who believe they may be fired may steal proprietary information to blackmail management
Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA
An out-of-band security fix from Microsoft put administrators in a familiar but tough spot: potentially damned if they patched and damned if they didn't.
Only 10 percent of organizations are actually using effective anti-spam technologies
Endpoints pose security risks to an enterprise, but identifying those endpoints can be IT's biggest challenge.
New research from Aberdeen shows how Best-in-Class companies are getting the most out of unified threat management technologies and services.
Results of AberdeenGroup research shed light on best practices in vulnerability management
How to protect yourself from the threats posed by unified communications.
Your employees may take the corporate laptop on summer holiday and bring back security risks to your network
Strong, effective IT security can be compromised by orphaned accounts and entitlements. We offer strategies to manage these expired accounts and entitlements.
With the right investigative techniques, experts maintain, fraud-busters can connect the dots, uncover evidence, and combat fraud
SQL injection vulnerabilities are easy -- and cheap -- to test for, regardless of whether you're a good guy or a malicious hacker
Why saying "it can't happen to us" isn't a solution
Is there a holistic solution for ensuring the secure, fast, and reliable delivery of applications?