Moving data to the cloud can be scary, as you must ensure cloud providers handle it in a way that meets regulatory requirements. Four best practices can help.
It's not just about Java. What can you do to improve the security of Mac browsing?
Mobile devices are great for productivity. For security, not so much. Enterprises can minimize security concerns by using location features and handy apps.
Contact center fraud isn't a huge problem -- but it's a growing one. And it's often part of a multi-channel security assault. Here are some tips on how to prevent it.
Despite all of the advice on preventing data breaches, such breaches will inevitably happen. The right preparation will help you respond quickly and contain the damage.
Distributed denial of service (DDoS) attacks are growing in size and intensity. What can you do to fight them?
While Shodan isn't exactly "the scariest search engine on the Internet," it does present some security risks. Here is how to minimize them.
Mac OS X has developed a reputation for security – which means many people ignore measures they should take to secure Macs in the enterprise.
A U.S. software programmer made headlines when he outsourced his own job to China. He probably never would have gotten away with it if his employer had been paying attention to its log files.
Anti-virus software is no longer a match for today's threats. Here's what your business needs to stay protected.
As Java has become a favorite tool of hackers, some experts are advising folks to disable it in browsers. What should business users do?
Mobile device management can help enterprises deal with BYOD. But there are other ways of minimizing BYOD risks as well.
Hacking motivated by political and social objectives grew strongly in 2012. Here is how to protect your company from the burgeoning hacktivism threat.
Avoiding hacks is perhaps the most essential responsibility for security organizations, which can learn some valuable lessons from this analysis of a real-life hack.
Former CIA Director General David Petraeus and paramour Paula Broadwell could have made good use of three strategies for keeping private email exchanges private.
While security software can help prevent spear phishing attacks, staff training is the best way to avoid phishing losses.
While iPads and other tablets offer the promise of major productivity gains in the enterprise, they can also introduce some pretty big security issues. Here's how to tackle those challenges.
While it's bad to be targeted by a hacker using new and relatively unknown security vulnerabilities, it's awful to fall victim to well-known attacks.
What do three of the five most common website attacks have in common? Yes, a lack of input sanitization. Find out why it's important and what to do about it.
Think installing antivirus software is all you need to do to protect data while surfing the Web? Don't kid yourself -- and use these five ways to make browsing sessions more secure.
Hackers love to target users' website passwords. Companies can thwart them by using multiple methods designed to make hacking as costly and time consuming as possible.
RFI inclusion is a simple website attack that nonetheless can make sites vulnerable to data loss or other malice. Using careful code logic will thwart RFI attacks.
Input sanitization is key to defending against XSS attacks. Is your company's website secured?
Your company's web site does not have to be the next victim of a SQL injection breach. Here's how to protect against attack.
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Jul 2009
- Jun 2009
- May 2009
- Dec 2008
- Dec 2007
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?