Advanced threat detection offers a more proactive approach to enterprise security than traditional perimeter defenses.
Traditional security techniques are no longer enough. By the time malware is spotted and added to antivirus (AV) signatures, the bad guys have either gotten in and wreaked havoc or buried themselves to … more »
Both Apple's iOS and Android have security strengths and weaknesses, experts say.
As their use of public cloud grows, organizations must ensure they are doing all they can to achieve a secure cloud environment.
Cory Scott, director of Information Security at LinkedIn, discusses how the business social network manages security even with a small team.
Do not kid yourselves, security professionals. You need more than one WiFi security testing tool. Here are 10 free or inexpensive options.
Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.
The Obama administration and some in the private sector believe sharing threat information can help thwart cyberattacks. But not everyone is convinced.