Articles by Drew Robb 

Guide to Getting the Right Single Sign-on Solution

Single sign-on solutions help users cope with password pressures by enabling a single authentication event to offer access to multiple applications.

How to Mitigate Fourth-Party Security Risks

What do you know about your vendors' vendors? Fourth-party security risks can be serious. How can you mitigate them?

Advanced Threat Detection Buying Guide

Advanced threat detection offers a more proactive approach to enterprise security than traditional perimeter defenses.

Are Your Databases Secure? Think Again

Targeting enterprise databases is a common attack tactic, as the Anthem breach showed, yet many companies neglect database security.

Catching Enterprise Mobility Management Wave

While mobile device management was once all the rage, enterprises are moving to enterprise mobility management as their mobile strategies become more essential to their business.

10 Tips to Mitigate Data Breaches

We include a list of vendors that offer solutions that can help improve your response to security threats and data breaches.

Cyber Security's Big Data Problem

Big Data has rendered older security models largely obsolete. The all-in-one product approach that once served the industry well is now inadequate.

Whitelisting: Why and How It Works

Bad guys continually tweak malware, making it tough for traditional antivirus products to keep up. Whitelisting can help, by allowing only pre-approved applications.

Security Compliance Primer and Buying Guide

Security compliance is a complex and sometimes onerous task. Here we offer advice on best practices that can help, along with a guide to available tools.

HR a Hot Target for Cybercriminals

Hackers see HR as an easy – and valuable – target. Educating HR staff is a key defense.

Buying Guide: Big Data Apps for Security

A growing number of vendors are offering Big Data-driven security solutions that can help prevent data breaches before they happen. We look at four such solutions.

How to Bake Better Security into Applications

Mobile and cloud-based apps create new vulnerabilities, which makes it more important than ever for developers to make their code more secure.

How to Secure Mobile Devices

The popularity of mobile devices is creating real security headaches for IT organizations.

SaaS and Security: Is Your Data Safe?

Software-as-a-Service applications offer big benefits to small businesses, but is it safe to place your company data in someone else's hands? Here's what you need to know.

Feel Vulnerable? Time for Vulnerability Management Tools

To combat evolving network security threats, the industry turns its attention to vulnerability management.

Top 10 Security Trends

Remember when your biggest fear was a virus outbreak? The latest round of threats will make CISO's positively nostalgic for those simpler times.

Code Green Brings Data Loss Prevention to SMBs

Large corporations aren’t the only ones with information worth stealing. Small businesses can also prevent sensitive data from escaping with new appliances from Code Green Networks.

Secure Your Email with Encryption

Who's reading your emails? Only those you deem worthy, provided that you adopt an encryption platform that suits (and protects) your business.

Getting the NAC of Security

Network Access Control adds yet another layer of technology to the security labyrinth – but some SMBs really need it.

New HIPS Technology Takes on Zero-Day Attacks

Some industry watchers say host-based intrusion detection systems may take the lead in battling zero-day attacks.

How to Improve on Wireless Security

If you're looking to secure an enterprise WLAN, many industry observers are pointing IT managers to WPA2.

Tales from "De Crypt"

Few things get the vultures circling like news of a security breach. A look at how one company assures confidentiality by encrypting all of the data that touches its SAN.

The Incredibly Shrinking Backup Window

Data Domain aims to reduce backup times by up to 20x, and prods tape loyalists to ''move on''.

Adding Biometrics to Enterprise Security Arsenal

Are biometrics ready for widespread deployment? What are the pros and cons of going with this security weapon?

Disaster Recovery Sites: How Far Away is Far Enough?

The recent devastation from Gulf Coast hurricanes raises an important question for enterprises: How far away should your disaster recovery site be?