Lisa Phifer - Article Archives - Page 1

5 Best Practices for Securing Remote Access

July 11, 2011
New ways to enable safe anywhere, anytime remote access are being demanded by the rising tide of mobile workers.
READ MORE

Top 5 PDF Risks and How to Avoid Them

May 3, 2011
Unlike security threats you can police with scanning and filtering, reducing PDF exploits can be challenging.
READ MORE

Top 10 Android Security Risks

March 18, 2011
Android's popularity is rising among consumers – and hackers.
READ MORE

RSA: Securing the Network

February 25, 2011
Internet-borne crime, cloud service delivery, and compliance concerns continue to push network security vendors to aim higher to secure today's networks.
READ MORE

RSA: New Frontiers in Threat Research

February 22, 2011
RSA speakers drill into emerging attacks and trends, from unruly apps to malicious tweets.
READ MORE

The Top 10 Botnet Events of 2010

February 18, 2011
2010 was a banner year for botnet boons and busts.
READ MORE

Top 10 Data Breaches of 2010

January 21, 2011
Last year's biggest breaches were still caused by old-fashioned blunders. Here’s a rundown of 10 of the most significant data breaches of 2010.
READ MORE

Review: AirWatch Enterprise MDM for Apple iOS4

January 4, 2011
AirWatch uses Apple MDM to control iOS4 iPads, iPhones, and the apps allowed to run on them.
READ MORE

Top 10 Mobile Mistakes to Avoid This Holiday Season

December 14, 2010
Symantec finds that smartphone users are putting themselves at risk this holiday season. Here's how you can avoid the smartphone Grinch.
READ MORE

Review: Astaro RED (Remote Ethernet Device)

December 2, 2010
Enforcing consistent network security throughout a large enterprise can be challenging--especially for branches with few users and no IT. Astaro's RED offers an affordable solution.
READ MORE

10 Ways to Protect Yourself from Firesheep Attacks

November 5, 2010
Our expert offers the top ten ways to surf websites vulnerable to Firesheep without getting fleeced. Learn how to best defend yourself from Firesheep and other sidejacking attacks.
READ MORE

Social Networking Security Hot Topic at Interop NY

October 29, 2010
Interop NY 2010 attendees observed trends in network security ranging from cloud computing to green data centers, but the hottest topic was social networking--from policy development and controls to vulnerability management and compliance.
READ MORE

Top Ten Ways to Avoid an Evil Twin Attack

October 18, 2010
Business travelers are particularly susceptible to evil twin attacks--hacker-created wireless access points that use real network names (SSIDs) to bait users into connecting to them.
READ MORE

Review: MXI Stealth ZONE

October 6, 2010
Security features are robust in this fast, efficient "secure USB desktop" from MXI, which uses an encrypted flash drive with speedy BlueFly processor to boot a PC-adapted, IT-customized Microsoft Windows Embedded Standard image.
READ MORE

Top 10 Email Malware Threats

September 16, 2010
Despite spam and malware filters, email-borne Trojans and exploits continue to thrive, propagated by file attachments and embedded URLs. We rank the worst offenders and offer tips for protecting your network.
READ MORE

Top Ten Web Malware Threats

August 9, 2010
Web-borne malware encounters continue to rise, leveraging a variety of vectors, methods, and exploits. Use this list to identify and fight trends that are likely to target your Web servers and users.
READ MORE

Review: AirWatch Enterprise Package

July 30, 2010
Turn-key service delivers Web-based control over employee smartphones helping businesses manage iPhones, Android-based devices, BlackBerrys, and Windows Mobile smartphones.
READ MORE

Top Ten Security Reasons to Upgrade to Windows 7

July 12, 2010
Windows 7 Enterprise delivers enough security improvements to justify the cost and hassle of migration. We outline ten of the best security benefits.
READ MORE

Gartner Security Summit News Round-Up

July 1, 2010
Annual IT security gathering urges attendees to adopt more pragmatic, risk-centric, business-focused approaches.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|