New ways to enable safe anywhere, anytime remote access are being demanded by the rising tide of mobile workers.
Unlike security threats you can police with scanning and filtering, reducing PDF exploits can be challenging.
Android's popularity is rising among consumers – and hackers.
Internet-borne crime, cloud service delivery, and compliance concerns continue to push network security vendors to aim higher to secure today's networks.
RSA speakers drill into emerging attacks and trends, from unruly apps to malicious tweets.
2010 was a banner year for botnet boons and busts.
Last year's biggest breaches were still caused by old-fashioned blunders. Heres a rundown of 10 of the most significant data breaches of 2010.
AirWatch uses Apple MDM to control iOS4 iPads, iPhones, and the apps allowed to run on them.
Symantec finds that smartphone users are putting themselves at risk this holiday season. Here's how you can avoid the smartphone Grinch.
Enforcing consistent network security throughout a large enterprise can be challenging--especially for branches with few users and no IT. Astaro's RED offers an affordable solution.
Our expert offers the top ten ways to surf websites vulnerable to Firesheep without getting fleeced. Learn how to best defend yourself from Firesheep and other sidejacking attacks.
Interop NY 2010 attendees observed trends in network security ranging from cloud computing to green data centers, but the hottest topic was social networking--from policy development and controls to vulnerability management and compliance.
Business travelers are particularly susceptible to evil twin attacks--hacker-created wireless access points that use real network names (SSIDs) to bait users into connecting to them.
Security features are robust in this fast, efficient "secure USB desktop" from MXI, which uses an encrypted flash drive with speedy BlueFly processor to boot a PC-adapted, IT-customized Microsoft Windows Embedded Standard image.
Despite spam and malware filters, email-borne Trojans and exploits continue to thrive, propagated by file attachments and embedded URLs. We rank the worst offenders and offer tips for protecting your network.
Web-borne malware encounters continue to rise, leveraging a variety of vectors, methods, and exploits. Use this list to identify and fight trends that are likely to target your Web servers and users.
Turn-key service delivers Web-based control over employee smartphones helping businesses manage iPhones, Android-based devices, BlackBerrys, and Windows Mobile smartphones.
Windows 7 Enterprise delivers enough security improvements to justify the cost and hassle of migration. We outline ten of the best security benefits.
Annual IT security gathering urges attendees to adopt more pragmatic, risk-centric, business-focused approaches.
Perfect for SMBs, KRMC Cloud ($19.95 per drive per year) offers affordable thumb drive security with a public cloud service.
Protect your business against this year's ten most worrisome Web application security risks.
This week, Meru announced four new Service Assurance applications, including its own WIPS.
An in-depth look at CACE Pilot ($1295), which cuts large-volume traffic captures down to size through visualization, drill-down, reporting, and more.
Enhance network security by finding your WLAN's vulnerabilities before attackers do--and without spending a bundle.
Faster network infrastructure pushes more virtualized services into the cloud, reshaping security risks and strategies.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?