Despite the risks of not making security policies central to enterprise BYOD and mobility programs, many organizations are ignoring this best practice.
Hackers like the Syrian Electronic Army are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.
As an annual contest shows, social engineering can be an effective way for hackers to obtain sensitive data. Training is one of the best ways to fight social engineering.
Dropbox lacks security features required by many enterprises. Here are tips for evaluating enterprise file sharing software, a good alternative for many companies.
Mobile and cloud-based apps create new vulnerabilities, which makes it more important than ever for developers to make their code more secure.
Want employees to pay attention to security awareness training? Make it accessible, pervasive and targeted to your audience.
Most Windows-based devices are running Java 6. Oracle is no longer releasing patches for this version of the software, which makes machines running it vulnerable to security risks.
As revelations about the NSA's security program continue to come, it's a good time to discuss workplace surveillance and when and why it might be used.
With new cyber-attacks and data breaches emerging all the time, organizations must revamp their security postures to address these challenges. The senior director of information security for Websense offers five tips for doing so.
It may not seem like a big deal if an attacker can hack into your printer. But attacks against embedded systems like printers can expose you to larger security risks.
While digital certificates play a vital security role, they also present security risks. A certificate management system is a good way to mitigate many of those risks.
The Edward Snowden affair has made enterprises all too aware of insider threats to data. From policies to software, organizations can take action to mitigate such threats.
While there is much debate over social media's impact on productivity, it clearly creates security risks. These simple practices should keep employees’ social media use from endangering the enterprise.
Reports of Android malware are rampant. Should enterprises be worried?
As details of the National Security Agency's PRISM program continue to emerge, how concerned should enterprises be about government requests for data?
Moving data to the cloud can be scary, as you must ensure cloud providers handle it in a way that meets regulatory requirements. Four best practices can help.
It's not just about Java. What can you do to improve the security of Mac browsing?
Mobile devices are great for productivity. For security, not so much. Enterprises can minimize security concerns by using location features and handy apps.
Contact center fraud isn't a huge problem -- but it's a growing one. And it's often part of a multi-channel security assault. Here are some tips on how to prevent it.
Despite all of the advice on preventing data breaches, such breaches will inevitably happen. The right preparation will help you respond quickly and contain the damage.
Distributed denial of service (DDoS) attacks are growing in size and intensity. What can you do to fight them?
While Shodan isn't exactly "the scariest search engine on the Internet," it does present some security risks. Here is how to minimize them.
Mac OS X has developed a reputation for security – which means many people ignore measures they should take to secure Macs in the enterprise.
A U.S. software programmer made headlines when he outsourced his own job to China. He probably never would have gotten away with it if his employer had been paying attention to its log files.
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Jul 2009
- Jun 2009
- May 2009
- Dec 2008
- Dec 2007
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?