Database security has never been more important, given the high value hackers place on data. These database security best practices will help protect your data.
There are some new application security threats in town, and they are pretty scary.
Patch management software automates patch management, one of the most important security tasks in any organization.
Many security experts prefer open source software like VeraCrypt, which can be used to encrypt flash drives, because of its readily available source code.
Using SQL injection hackers can wreak havoc on databases and data-driven applications. Fortunately there are ways to reduce SQL injection risk.
Full disk encryption software offers valuable protection for data on laptops. These seven FDE solutions are worthy of consideration.
Automated penetration testing tools and open source tools, especially those in Linux security distributions, are invaluable aids for internal pentests.
A penetration test is only as good as the company conducting it. Here is everything you need to know to find the right penetration testing company.
Identity authentication is especially important for high-value transactions, so it is important to get it right.
Identity and access management (IAM) for third-party organizations is a tough security challenge. Gartner's Felix Gaehtgens offers tips that will help.
Here is solid advice for evaluating a next-generation firewall (NGFW), from features to consider to questions to ask.
Cloud access security brokers are a relative newcomer to the enterprise, but cloud security concerns will drive rapid adoption of CASBs.
Have you hardened your Windows file servers yet? Follow these steps to make sure your sensitive files are adequately protected against unauthorized access.
As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.
Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.
Open source vulnerability assessment tools are a great option for organizations that want to save money or customize tools to suit their needs.
While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.
It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.
The breach prevention and detection market is dominated by names like Symantec, McAfee and Juniper, but open source tools are also popular.
The open source network security tool's latest version offers significant improvements.
Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?
Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?
PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?
APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security.
- Jul 2016
- Jun 2016
- May 2016
- Apr 2016
- Mar 2016
- Feb 2016
- Jan 2016
- Dec 2015
- Nov 2015
- Oct 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Aug 2013
- Jun 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- May 2010
- Feb 2010
- Dec 2008
- Apr 2007
- Nov 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Dec 2003
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?