Datamation columnist Chris Nerney says once people take off their rose-colored glasses and take a realistic look at Firefox, he hopes they don't dismiss it... because what the industry needs is a choice.
A recent hack underscores the need to guard against attacks from ex-employees who know your systems inside and out.
You IT professionals can stop worrying now. Your security woes soon will be a thing of the past. Haven't we heard this before?
Online schemers are causing the unwitting more than just aggravation.
Which anti-phishing law is best?
Whatever your feelings about SCO or Microsoft, MyDoom hurts thousands of other companies, the global economy and the Internet in general.
More than half of all enterprises take only basic technological precautions -- or none at all -- to protect their wireless networks, according to a new Jupiter Research report.
At next week's eSecurity Conference & Expo in Virginia, security experts from the private sector, government and academia will focus on helping attendees develop effective strategies and policies for protection in the eBusiness era.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?