While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.
Microsoft and VMware both have extensible network virtualization offerings that make it possible for third-party vendors to integrate their security tools.
While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.
Bad guys continually tweak malware, making it tough for traditional antivirus products to keep up. Whitelisting can help, by allowing only pre-approved applications.
Massachusetts' Needham Bank enjoys a bevy of benefits thanks to its mobile device management system.
Secure file transfer applications are becoming the preferred mode for securely exchanging data. What should you consider when buying SFT apps?
Mobile device management (MDM) can help enterprises minimize security risks associated with BYOD. Here is what you need to know if you plan to purchase an MDM system.
File sharing and sync (FSS) services like Dropbox can expose sensitive corporate data. Luckily, there are enterprise-grade FSS alternatives.
When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.
As enterprises demand more secure cloud-based externalization, companies like Exostar are answering the call with IAM solutions.
Security compliance is a complex and sometimes onerous task. Here we offer advice on best practices that can help, along with a guide to available tools.
Israeli startup FortyCloud recently opened a U.S. office to grow its business, which focuses on helping companies secure data in the public cloud.
Among the newest security features for Microsoft's Azure is the ability to authenticate users to software-as-a-service apps via Azure Active Directory.
A managed security service provider (MSSP) is a good option for cloud security, say experts.
The admin capabilities of a mobile security management solution from Marble Security impressed reviewer Matt Sarrel.
Trying to make a case for purchasing a mobile device management solution? Our MDM ROI calculator can help.
Static analysis tools can help software developers produce more secure applications. Here is what you need to know when evaluating such tools for your organization.
- Mar 2015
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Apr 2013
- Jan 2013
- Oct 2012
- Sep 2012
- Aug 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2009
- Dec 2008
- Nov 2008
- Jun 2008
- Apr 2008
- Oct 2007
- May 2007
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?