DNS Security Extensions (DNSSEC) can improve the overall security of DNS, but note that there are some criticisms and caveats before you going running off and planning for full implementation of DNSSEC.
If your work for an entity that stores, processes, or transmits credit card data in electronic form, youd better be ready to comply with PCI DSS v2.0, which took effect on January 1, 2011.
Regardless of what kind of thinker and learner you are, its critical to present complex security concepts clearly to ensure maximum communication effectiveness with your audience.
Personally owned, individual liable converged mobile devices are becoming commonplace in corporate environments and pose unique data protection threats.
A predominantly cloud-based architecture is the future for most enterprises. The question is how to best balance privacy and security with cost and business risk.
What the 2010 security acquisition spree by major players, including Symantec, HP, IBM, CA and VeriSign, could mean to IT security professionals.
Worst case scenarios of distributed SCADA attacks include bringing down the power grid to a major metropolitan city, yet most SCADA experts are not security experts--and vice versa.
An exhaustive look at all the ins and outs of shopping for a WAF. Doing the RFP work up-front will help to ensure that your organization gets the right tool for the job. Our expert tells you how.
The BP oil spill is a cautionary tale for businesses that are functioning without proper business continuity and disaster recovery processes and procedures in place.
We outline the key considerations for companies looking to make informed, risk-sensitive, purchasing decisions when selecting a cloud-based e-mail solution.
The new BSIMM2 provides the data-driven measurements that allow organizations to objectively assess their software security maturity level against their peers and themselves.
Establishing a clear set of social networking policies is important to both the security of your business and of your employees.
Security consultant Diana Kelley outlines several key areas where enterprises can green their security compliance programs.
At the RSA Conference this week in San Francisco, some small vendors stood out for their innovative security solutions.
At RSA, most heads are in the cloud with everyone from Symantec to IBM delivering new cloud-based security solutions.
Sometimes knowing who, what, where, and when is not such a good thing. Security consultant Diana Kelley explores the dangers of geo-location to your business's information security.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?