Personally identifiable information, or PII, is especially valuable to hackers. Here's how to make sure they don't get their hands on it.
Carriers of both iOS and Android mobile devices can improve their mobile security with apps that offer help with password management, encryption and other security best practices.
Even security-conscious enterprises like Yahoo can be compromised by attacks in which ad servers are used to deliver malware. How can you fight this 'malvertising' threat?
Hackers have found many ways to exploit digital certificates. What can you do to defend yourself against digital certificate risks?
Though Apple has added MDM-like features to iOS7, many enterprises will find they still need third-party mobile device management solutions.
Most Windows-based devices are running Java 6. Oracle is no longer releasing patches for this version of the software, which makes machines running it vulnerable to security risks.
As revelations about the NSA's security program continue to come, it's a good time to discuss workplace surveillance and when and why it might be used.
It may not seem like a big deal if an attacker can hack into your printer. But attacks against embedded systems like printers can expose you to larger security risks.
Security experts have long held a dim opinion of the Microsoft Windows OS. But Windows 8's lineup of security features may help change their minds.
The Edward Snowden affair has made enterprises all too aware of insider threats to data. From policies to software, organizations can take action to mitigate such threats.
Reports of Android malware are rampant. Should enterprises be worried?
Mobile devices are great for productivity. For security, not so much. Enterprises can minimize security concerns by using location features and handy apps.
While Shodan isn't exactly "the scariest search engine on the Internet," it does present some security risks. Here is how to minimize them.
Mac OS X has developed a reputation for security – which means many people ignore measures they should take to secure Macs in the enterprise.
A U.S. software programmer made headlines when he outsourced his own job to China. He probably never would have gotten away with it if his employer had been paying attention to its log files.
A confusing collection of cloud security standards can make it tough to evaluate cloud provider security.
Mobile device management can help enterprises deal with BYOD. But there are other ways of minimizing BYOD risks as well.
Avoiding hacks is perhaps the most essential responsibility for security organizations, which can learn some valuable lessons from this analysis of a real-life hack.
Former CIA Director General David Petraeus and paramour Paula Broadwell could have made good use of three strategies for keeping private email exchanges private.
What do three of the five most common website attacks have in common? Yes, a lack of input sanitization. Find out why it's important and what to do about it.
Hackers love to target users' website passwords. Companies can thwart them by using multiple methods designed to make hacking as costly and time consuming as possible.
RFI inclusion is a simple website attack that nonetheless can make sites vulnerable to data loss or other malice. Using careful code logic will thwart RFI attacks.
Input sanitization is key to defending against XSS attacks. Is your company's website secured?
Your company's web site does not have to be the next victim of a SQL injection breach. Here's how to protect against attack.
A Denial of Service attack can disrupt your organization's web site and network services. Here's how to defend yourself.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?