User passwords are often a weak link in the corporate security chain. How can security pros make users adhere to strong password policies?
Bitcoins have the potential to revolutionize business payment transactions. But they also have some security shortcomings. Here are 10 tips for keeping Bitcoins secure.
In the wake of revelations about NSA backdoors in encryption systems, organizations must do everything they can to ensure their encryption is as strong as possible.
From increasingly sophisticated DDoS attacks to stuxnets to insider threats, companies have plenty to worry about when it comes to enterprise security in 2014.
Hackers like the Syrian Electronic Army are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.
There is always a batch of enterprise security startups with clever technologies poised to be purchased by Infosec giants. Here are 13 interesting security startups to keep an eye on.
Companies that lack the resources to run their own bug bounty programs may want to consider a bug bounty as a service program.
While Big Data analytics will probably never replace existing network security measures like IPS and firewalls, it can help reveal breaches that might otherwise have gone undetected.
While digital certificates play a vital security role, they also present security risks. A certificate management system is a good way to mitigate many of those risks.
As details of the National Security Agency's PRISM program continue to emerge, how concerned should enterprises be about government requests for data?
Moving data to the cloud can be scary, as you must ensure cloud providers handle it in a way that meets regulatory requirements. Four best practices can help.
Distributed denial of service (DDoS) attacks are growing in size and intensity. What can you do to fight them?
The BYOD boom is leading to a revival of network access control (NAC) technology, as more companies employ NAC to secure their networks.
Hackers are nothing if not creative, so it's important for enterprise security pros to educate themselves about emerging security threats like these six.
Anti-virus software is no longer a match for today's threats. Here's what your business needs to stay protected.
While cloud security technology hasn't eliminated cybercrime, it has given organizations some new and effective ways of fighting it.
Companies moving applications to a public cloud need to be aware of the risks created by using virtual machines in a shared cloud infrastructure.
While security software can help prevent spear phishing attacks, staff training is the best way to avoid phishing losses.
While it's bad to be targeted by a hacker using new and relatively unknown security vulnerabilities, it's awful to fall victim to well-known attacks.
Malwarebytes Enterprise Edition detects and removes malware, removing all traces after a system has been infected, a capability that is likely to be especially important to small businesses.
Not many people consider security risks associated with IPv6, the newest version of the Internet Protocol. But maybe they should.
While Microsoft System Center 2012 Endpoint Protection offers deployment and management convenience, its anti-malware engine is weak in comparison to competitors.
Rootkits are in the crosshairs of this innovative anti-malware technology that runs directly on the processor, underneath the operating system.
Passwords are potentially the weakest link in your organization's information security systems. Biometric authentication technologies promise a more secure alternative.
CA Technologies spinoff Total Defense offers robust management capabilities in its AV-only product. But the software lags a bit behind the competition in anti-malware sophistication.
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Aug 2013
- Jun 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Feb 2010
- Dec 2008
- Apr 2007
- Nov 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Dec 2003
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?