The popularity of mobile devices is creating real security headaches for IT organizations.
Software-as-a-Service applications offer big benefits to small businesses, but is it safe to place your company data in someone else's hands? Here's what you need to know.
To combat evolving network security threats, the industry turns its attention to vulnerability management.
Remember when your biggest fear was a virus outbreak? The latest round of threats will make CISO's positively nostalgic for those simpler times.
Large corporations arent the only ones with information worth stealing. Small businesses can also prevent sensitive data from escaping with new appliances from Code Green Networks.
Who's reading your emails? Only those you deem worthy, provided that you adopt an encryption platform that suits (and protects) your business.
Network Access Control adds yet another layer of technology to the security labyrinth but some SMBs really need it.
Some industry watchers say host-based intrusion detection systems may take the lead in battling zero-day attacks.
If you're looking to secure an enterprise WLAN, many industry observers are pointing IT managers to WPA2.
Few things get the vultures circling like news of a security breach. A look at how one company assures confidentiality by encrypting all of the data that touches its SAN.
Data Domain aims to reduce backup times by up to 20x, and prods tape loyalists to ''move on''.
Are biometrics ready for widespread deployment? What are the pros and cons of going with this security weapon?
The recent devastation from Gulf Coast hurricanes raises an important question for enterprises: How far away should your disaster recovery site be?
Panned at first, the merger of security and storage giants turned out to be well-timed.
A Seattle hospital had a serious spyware issue, and IT administrators knew they needed to treat it quickly before confidential information was put at risk.
As companies increasingly begin to look to grid computing, major security concerns will need to be addressed. What are the problems, and how can they be fixed?
Think disaster recovery and business continuity are the same thing? Think again. You better know the difference and you better be prepared for both.
High-profile data security breaches are boosting the fortunes of storage security vendors. Will national legislation follow?
Disaster recovery solutions don't come cheap but, with a little planning and foresight, DR doesn't have to be an all or nothing proposition.
IT departments are struggling to manage the deluge of security data that overwhelms their systems and their work days.
Battling spam is no easy thing. It often takes more than one kind of tactic and more than one kind of weapon. Here's a look at the different multi-faceted approaches.
When IT and security managers are trying to handle 5,000 to 10,000 security incidents a second, they need a technology that will help them visualize what is happening on their network. Is SIM software the answer?
Server disposal can be a weak link in enterprise data security. Don't forget to scrub them... and then maybe take a hammer to them.
The open source community goes with the saying, ''Information wants to be free''. But does free necessarily mean safe? And how do you safely lock it down?
Secure Content Management appliances are catching on in smaller offices where ease-of-use is critical.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?