In this special issue, we are revealing the winners of our Security 7 awards. Discover which
outstanding information security professionals were recognized for their contributions.
Audit and compliance planning, Choosing security services, End user training and awareness, Risk assessments and metrics, Writing and enforcing policies
Windows patch management, Microsoft endpoint security, Microsoft IAM, Microsoft management issues, Microsoft security threat management
Intrusion prevention, Integrating security into networks, Managing firewalls, Network access controls, Wireless network security
Antimalware, Configuration and patch management, Security systems integration, Security vulnerability management
While many Web proxies are legitimate, some attackers use them to hide their attacks. Expert Nick Lewis explains how block the malicious proxies.
The Staples breach is suspected to have affected payment card information in an as-yet-undetermined number of the office supply chain's stores in the northeast U.S.
The Sality malware has reemerged with new capabilities: brute-forcing passwords on wireless access points. Enterprise threats expert Nick Lewis explains how to.
IaaS clouds need baseline server configuration, but real security requires enterprises to go beyond that. Expert Dave Shackleford reviews some IaaS security best practices.
There is more potential trouble for Apple iCloud users as a nationwide man-in-the-middle attack struck the iCloud website in China amid the country's launch of the new iPhone 6.
Planning a data backup strategy on a private cloud requires certain factors to assure security. Expert Dejan Lukan gives some advice on what to take into consideration.
The increasing number of mobile devices in enterprise environments means a mobile data backup plan is required, and it won't be the same as one for a laptop.
The sharp-tongued ex-BlackBerry exec details SAP's mobile strategy and why it won't be making an MDM acquisition anytime soon.
Android fragmentation can present problems when it comes to MDM, but careful policy implementation can mitigate those issues.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said.
Apple has recently come under fire over the security of its customers' data, but the company has done a “nice job” using best practices to secure iTunes backups, according to a security researcher.
Report says mobile network operators will lose $14bn of potential sales to over the top services this year
Minister for the digital economy Ed Vaizey discusses his new role and the future of digital policy
Nearly a quarter of employees are completely unaware of their organisation’s bring your own device policy