Security


Microsoft Azure Key Vault Security Service Now Available

Microsoft recently announced its Azure Key Vault service is available for commercial use.

VMware Adopts Docker Container Security Guidelines

VMware has updated a management tool to meet emerging security standards for Docker containers.

Security Concerns Block Cloud Adoption, Survey Says

A recent survey examining the top perceived problems with cloud adoption points to one major obstacle: security.

Research Paints Bleak Picture of Mobile App Privacy and Security

Developers and rogue enterprise users can cause problems.

Study: Using Cloud Could Be Dangerous and Expensive

Survey shows IT and security pros wary of potentially expensive cloud data breaches.

Which Data Protection Is Right for You?

Due to the nature of data protection, what's right for one enterprise may not be right for yours. Here's some tips to consider when finding a solution to secure your data.

Trend Micro Announces Enterprise Endpoint Sensor Protection

Trend Micro Inc. recently announced enhancements to its enterprise-wide security platform designed to provide a better unified threat defense against known attacks while also detecting and responding to new targeted attacks now in widespread use.



Security Automation and Improved IT Processes in 2013

Look for these transforming trends in your network security in the coming year.

Ramsomware Poses New Threat to Users

A new exploit poses as law enforcement to trap users into paying to unlock their system What you need to know about the exploit and how to keep your users safe.

Making the Grade: 6 Data Protection Best Practices for Universities and Colleges

We explore the best practices that address the special needs of educational institutions.

Q&A: Public Cloud Security

What IT should do to secure data in the cloud.

Top 3 Trends for Cybersecurity in 2013

As cyber criminals get smarter and mobile malware continues to proliferate along with fraudulent devices, how can security teams effectively prepare for the sophisticated threats ahead?

Q&A: Taking a Risk-Based Approach to Security

Security is more than just determining which users have access to applications and data. Compliance also isn't enough. What's needed is a risk-based approach to security -- a pro-active, prevention-oriented line of attack to keep your enterprise safe.

IT Security: 2012 in Review, Predictions for 2013

The top trends security administrators dealt with in 2012 and what's ahead in 2013.

Q&A: Making File Transfers and Sharing More Secure

Is FTP losing out to file-sharing cloud services?

Keyloggers: The Most Dangerous Security Risk in Your Enterprise

How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.

SCADA Protocol Testing in Critical Infrastructure

We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.

More Tips for Next-Generation Firewalls: Security Policy Management

We examine policy considerations and how to manage security policy in a mixed environment.

3 Tips for Next-Generation Firewalls: Sizing and Deployment

Before you implement a next-generation firewall, follow these three tips to ensure project success.

Q&A: The State of Data Security, Compliance, and Why Your Company May Be at Risk

A study of corporate e-mail and file transfer habits highlights security concerns.