Moving data to the cloud can be scary, as you must ensure cloud providers handle it in a way that meets regulatory requirements. Four best practices can help.
Moving to the cloud is easy, but remaining compliant in the cloud is another matter. When you move to the cloud you're handing over control of your data to a third party. When data is not under your direct … more »
Top Linux security engineers address whether complete security can ever be achieved with the open source operating system.
Microsoft is out with its latest Patch Tuesday update and once again, the Internet Explorer (IE) Web browser gets lots of attention.
It's not just about Java. What can you do to improve the security of Mac browsing?
Although IPv6 is still not widely adopted, the Internet is seeing the first signs of IPv6-based attacks.
How did Microsoft shut down the notorious Citadel botnet ring, which stole more than $500 million from victims?
Mobile devices are great for productivity. For security, not so much. Enterprises can minimize security concerns by using location features and handy apps.