Distributed denial of service (DDoS) attacks are growing in size and intensity. What can you do to fight them?
The BYOD boom is leading to a revival of network access control (NAC) technology, as more companies employ NAC to secure their networks.
Hackers are nothing if not creative, so it's important for enterprise security pros to educate themselves about emerging security threats like these six.
Anti-virus software is no longer a match for today's threats. Here's what your business needs to stay protected.
While cloud security technology hasn't eliminated cybercrime, it has given organizations some new and effective ways of fighting it.
Companies moving applications to a public cloud need to be aware of the risks created by using virtual machines in a shared cloud infrastructure.
While security software can help prevent spear phishing attacks, staff training is the best way to avoid phishing losses.
While it's bad to be targeted by a hacker using new and relatively unknown security vulnerabilities, it's awful to fall victim to well-known attacks.
Malwarebytes Enterprise Edition detects and removes malware, removing all traces after a system has been infected, a capability that is likely to be especially important to small businesses.
Not many people consider security risks associated with IPv6, the newest version of the Internet Protocol. But maybe they should.
While Microsoft System Center 2012 Endpoint Protection offers deployment and management convenience, its anti-malware engine is weak in comparison to competitors.
Rootkits are in the crosshairs of this innovative anti-malware technology that runs directly on the processor, underneath the operating system.
Passwords are potentially the weakest link in your organization's information security systems. Biometric authentication technologies promise a more secure alternative.
CA Technologies spinoff Total Defense offers robust management capabilities in its AV-only product. But the software lags a bit behind the competition in anti-malware sophistication.
Here's how to detect and fight back against hackers who are using automated tools to attack your website.
Multiple levels of anti-malware protection combined with a community-based threat detection network and a centralized management server make Avast a compelling alternative for business-level virus protection.
Even good admins sometimes do bad things with passwords. Spotting these risky IT practices in your organization is a first step to a more secure password management strategy.
Your business can save money by issuing its own digital certificates for internal corporate resources such as intranets and VPNs.
All-in-one security appliances deliver comprehensive protection and easy manageability for small to mid-sized organizations.
Don't let that old hard drive leave the building without first scrubbing it clean of all data.
Have you hardened your file servers yet? Follow these steps to make sure your sensitive files are adequately protected against unauthorized access.
Don't let a lost or stolen laptop put your business at risk. Here's how to prevent a data breach by encrypting your organization's hard drives.
A new defense against data loss prevention: Bogus files that alert organizations to unauthorized access.
In addition to its traditional malware detection capabilities, McAfee's Endpoint Protection Suite offers some useful extra components, including a firewall.
Is your company prepared to manage the risks introduced by the BYOD (Bring Your Own Device) trend? Here's how to review and strengthen your organization's mobile security posture.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?