In this special issue, we are revealing the winners of our Security 7 awards. Discover which
outstanding information security professionals were recognized for their contributions.
Audit and compliance planning, Choosing security services, End user training and awareness, Risk assessments and metrics, Writing and enforcing security policies
Microsoft Windows configuration and patch management, Microsoft endpoint security management, Microsoft identity and access management, Microsoft security integration and centralized management, Microsoft security threat management
Detecting and preventing network intrusions, Integrating security into networks, Managing firewalls, Network access controls, Wireless network security management
Antivirus, antispyware management, Configuration and patch management, Integrated security appliances and systems, Security vulnerability management
Hailed by card brands as the cure to payment card fraud, Chip and PIN security technology will take years to deploy and has already proven vulnerable.
The widening array of sophisticated security attacks has prompted vendors of unified threat management systems to add advanced features to their products. This tip outlines emerging UTM features and explains how IT pros can best use them.
Bitcoin security may not be a top enterprise concern at the moment, but it may soon be. Michael Cobb explains how to ensure crypto-currency safety.
Video: Gartner's Jay Heiser says recent attacks on cloud providers show enterprises and business units must manage cloud security requirements.
The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.
Verizon bolstered its cloud security presence with a new web application firewall. The cloud-based WAF puts the telecom giant in the growing cloud firewall market with Akamai, Imperva and others.
Samsung forges ahead with Knox EMM, despite a free Knox knockoff coming in Google Android L.
Microsoft's decimation of Nokia's devices and services business allows the company to focus on Windows Phone in the future.
Microsoft hopes more custom Windows app development will enable IT to adopt Windows Phones and tablets in their organization.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
It seems like an obvious step, but one missed security update, patch or hot fix could spell disaster for Exchange.
As long as security remains a common concern for enterprise consumers, cloud providers must work hard to prove that they deserve their customers’ trust.
More than 25% of large digital marketplaces will have explicit strategies for consumer computing and security by 2018, according to Gartner
The Home Office spent £347m closing its Immigration Case Work programme, which was supposed to replace legacy databases
A cyber attack targeting MSNBC highlights cybercriminals’ abuse of the public’s trust in news sites, says Websense Security Labs
Vodafone invites up to 100 rural communities to apply for a place on a scheme to bring 3G coverage to mobile black spots