IT administrators are struggling to deal with the implications that cloud services have on security. SAML and related technologies such as single sign-on can help.
Sometimes a full Web proxy is too much, and all you need is DNS re-direction to provide security.
A growing number of vendors are offering Big Data-driven security solutions that can help prevent data breaches before they happen. We look at four such solutions.
Business databases are the holy grail for hackers. Matt Sarrel reviews some products from GreenSQL that help protect databases.
Sonatype's updated component lifecycle management solution takes aim at the risk of vulnerable open-source software components.
Unified security appliances help enterprises manage multiple security services, but keeping such devices up to date while incorporating scale is a challenge. Can virtualization help?
There is always a batch of enterprise security startups with clever technologies poised to be purchased by Infosec giants. Here are 13 interesting security startups to keep an eye on.
Though Apple has added MDM-like features to iOS7, many enterprises will find they still need third-party mobile device management solutions.
Reviewer Matt Sarrel finds HyTrust Appliance 3.5 an easy-to-use, hardware-based solution for mitigating security risks associated with virtualization.
Reviewer Matt Sarrel says Avira Free Android Security shows that simple device security does not require an expensive product only enterprises can afford.
While Big Data analytics will probably never replace existing network security measures like IPS and firewalls, it can help reveal breaches that might otherwise have gone undetected.
The BYOD boom is leading to a revival of network access control (NAC) technology, as more companies employ NAC to secure their networks.
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Apr 2013
- Jan 2013
- Oct 2012
- Sep 2012
- Aug 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2009
- Dec 2008
- Nov 2008
- Jun 2008
- Apr 2008
- Oct 2007
- May 2007
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?