The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.
In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.
When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.
Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).
The Bring Your Own Device, or BYOD, era has redefined the modern corporate landscape. Learn about the risks - and the tools you can use to securely embrace BYOD.
Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.
More companies are moving sensitive data to the cloud, increasing the need to secure that data. One popular approach is called a cloud access security broker, or CASB. Find out more about CASB technology and products here.
Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.
Network access control lets IT departments determine which users and devices have authorized permissions, adding another level of security to the network and its data.
Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.
Once again, Mozilla is quick to deal with a zero-day exploit first demonstrated at the Pwn2own hacking competition.
Endpoint security provides a layer of protection for devices outside the firewall.
Multi-factor authentication provides a more secure option than passwords and ID alone. We take a comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics and vendors, and issues to consider before adopting an MFA solution.
If you're considering using the FIDO U2F protocol, here's what you need to know.
Enhanced OS security is often little more than marketing hype, but Microsoft's new Windows Server 2016 features really move the security needle.
Scott Petry, co-founder and CEO of Authentic8, talks about his past with Postini and how his new startup is the future of online security. [VIDEO]