File sharing and sync (FSS) services like Dropbox can expose sensitive corporate data. Luckily, there are enterprise-grade FSS alternatives.
While BYOD still worries infosec pros, vendors like Microsoft are easing concerns by offering authentication and management capabilities.
Use-after-free memory errors often crop up in software application code.
Train users to read and heed mobile application permissions, says McAfee Labs.
Security compliance is a complex and sometimes onerous task. Here we offer advice on best practices that can help, along with a guide to available tools.
Most IT pros consider compliance a hassle. Yet the tools of compliance can empower security technologies and simplify risk management. Better yet, some of those tools are free.
A managed security service provider (MSSP) is a good option for cloud security, say experts.
Administrators use application performance management (APM) tools to meet ebbs and flows of demand. But few leverage the security benefits offered by APM solutions.
Personally identifiable information, or PII, is especially valuable to hackers. Here's how to make sure they don't get their hands on it.
Trying to make a case for purchasing a mobile device management solution? Our MDM ROI calculator can help.
Static analysis tools can help software developers produce more secure applications. Here is what you need to know when evaluating such tools for your organization.
What can you do to reduce your risk from Heartbleed? eSecurity Planet has got you covered.
Enterprises with IT security staffs should find it easy to implement the patch for the Heartbleed vulnerability. But small companies may struggle to protect their websites and customers, experts say.
Microsoft has ended official support for Windows XP. What does that mean for the security of the world's ATMs, most of which run XP?
Data breaches and data losses are just the beginning when it comes to cyber insurance. Policies may also cover such items as data forensics.
User passwords are often a weak link in the corporate security chain. How can security pros make users adhere to strong password policies?
Database usage is on the rise, as well as the applications that interconnect databases, meaning that SQL injection should still be a top concern for IT security pros.
Don't hate Dropbox. New approaches are evolving to help security teams deal with threats posed by cloud file sharing in the enterprise.
Protecting your data is one thing, but what about insuring it? If you are considering cyber insurance, here are some facts you need to know.
Here are three do's and two don'ts for responding to a data breach.
Even security-conscious enterprises like Yahoo can be compromised by attacks in which ad servers are used to deliver malware. How can you fight this 'malvertising' threat?
Using incident management to respond to data breaches quickly and effectively can help ensure a company's stock price does not decline in the wake of a breach.
Bitcoins have the potential to revolutionize business payment transactions. But they also have some security shortcomings. Here are 10 tips for keeping Bitcoins secure.
In the wake of revelations about NSA backdoors in encryption systems, organizations must do everything they can to ensure their encryption is as strong as possible.
Employee education can help prevent data breaches caused by the loss or theft of unencrypted devices, and employee monitoring is a key strategy for fighting insider theft.
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Jul 2009
- Jun 2009
- May 2009
- Dec 2008
- Dec 2007
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?