Columnists 

3 Tools for Enforcing Password Policies

User passwords are often a weak link in the corporate security chain. How can security pros make users adhere to strong password policies?

Top Apps for Boosting Mobile Security

Carriers of both iOS and Android mobile devices can improve their mobile security with apps that offer help with password management, encryption and other security best practices.

How to Fight Malvertising Threat

Even security-conscious enterprises like Yahoo can be compromised by attacks in which ad servers are used to deliver malware. How can you fight this 'malvertising' threat?

10 Bitcoin Security Tips

Bitcoins have the potential to revolutionize business payment transactions. But they also have some security shortcomings. Here are 10 tips for keeping Bitcoins secure.

6 Tips for Stronger Encryption

In the wake of revelations about NSA backdoors in encryption systems, organizations must do everything they can to ensure their encryption is as strong as possible.

December Data Breach Roundup: Theft Prevention, and More

Employee education can help prevent data breaches caused by the loss or theft of unencrypted devices, and employee monitoring is a key strategy for fighting insider theft.

How to Secure Digital Signatures

Hackers have found many ways to exploit digital certificates. What can you do to defend yourself against digital certificate risks?

7 Security Trends to Expect in 2014

From increasingly sophisticated DDoS attacks to stuxnets to insider threats, companies have plenty to worry about when it comes to enterprise security in 2014.

November Data Breaches: More Lessons Learned

In this second of two parts, we present more advice for security pros based on data breaches that occurred in November 2013, here focusing on how to fight hackers and malware.

November Data Breaches: Learn from Others' Mistakes

In this first of two parts, we look at what security professionals can learn from data breaches that occurred in November 2013.

How to Prevent DNS Attacks

Hackers like the Syrian Electronic Army are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.

13 Hot Security Startups to Watch

There is always a batch of enterprise security startups with clever technologies poised to be purchased by Infosec giants. Here are 13 interesting security startups to keep an eye on.

Data Breach Roundup: October 2013

Data loss related to theft and loss is on the rise, says security expert Ryan Kalember, thanks to the huge popularity of smartphones and tablets.

White Hats for Hire Find Software Bugs

Companies that lack the resources to run their own bug bounty programs may want to consider a bug bounty as a service program.

Apple iOS7 Management vs. MDM

Though Apple has added MDM-like features to iOS7, many enterprises will find they still need third-party mobile device management solutions.

Data Breach Roundup: September 2013

A surprising number of last month's data breaches involved the theft or loss of laptops or hard drives.

Lagging Updates Compound Java Risks

Most Windows-based devices are running Java 6. Oracle is no longer releasing patches for this version of the software, which makes machines running it vulnerable to security risks.

Workplace Surveillance Revisited

As revelations about the NSA's security program continue to come, it's a good time to discuss workplace surveillance and when and why it might be used.

How Big Data Analytics Can Boost Network Security

While Big Data analytics will probably never replace existing network security measures like IPS and firewalls, it can help reveal breaches that might otherwise have gone undetected.

Can Your Printer Put Your Whole Network at Risk?

It may not seem like a big deal if an attacker can hack into your printer. But attacks against embedded systems like printers can expose you to larger security risks.

Windows 8 Boosts Security with 5 New Features

Security experts have long held a dim opinion of the Microsoft Windows OS. But Windows 8's lineup of security features may help change their minds.

Digital Certificate Dangers, and How to Fight Them

While digital certificates play a vital security role, they also present security risks. A certificate management system is a good way to mitigate many of those risks.

How to Defend Against Insider Threats

The Edward Snowden affair has made enterprises all too aware of insider threats to data. From policies to software, organizations can take action to mitigate such threats.

Android Malware: Separating Reality from Hype

Reports of Android malware are rampant. Should enterprises be worried?

Will PRISM Impact Data Protection Strategies?

As details of the National Security Agency's PRISM program continue to emerge, how concerned should enterprises be about government requests for data?