Packets' Place in Network Security

Enterprises have long relied on network monitoring tools to troubleshoot connectivity problems. The same tools have evolved into an important way to ensure networks are secure.

The rise of the blended threat has dealt a fatal blow to many single-purpose security products, making it much harder to protect networks from intrusions and compromises. Still, network administrators … more »

Heartbleed Especially Risky for SMBs

Enterprises with IT security staffs should find it easy to implement the patch for the Heartbleed vulnerability. But small companies may struggle to protect their websites and customers, experts say.

ATMs on Windows XP: How Risky Is It?

Microsoft has ended official support for Windows XP. What does that mean for the security of the world's ATMs, most of which run XP?

Does Your Organization Need a Chief Trust Officer? [VIDEO]

Cyber Insurance Covers That? 7 Items You Might Not Know

Data breaches and data losses are just the beginning when it comes to cyber insurance. Policies may also cover such items as data forensics.

3 Tools for Enforcing Password Policies

User passwords are often a weak link in the corporate security chain. How can security pros make users adhere to strong password policies?

6 Steps for Fighting SQL Injection

Database usage is on the rise, as well as the applications that interconnect databases, meaning that SQL injection should still be a top concern for IT security pros.