Assessing and Managing Risk
Threats and Vulnerabilities
An FTC report urges vendors to be proactive in creating Internet of Things security and privacy controls, while a Tripwire survey shows IoT devices are a growing corporate risk.
With a number of new network security certifications available, knowing which one will best help your career can be confusing. Expert Kevin Beaver discusses the options.
A critical Linux vulnerability, called GHOST, has been found to affect glibc versions released since 2000, and could pose a remote exploit risk on many Linux systems.
Implementing ingress and egress filtering at the border router can help greatly improve security in a VMware-based virtual data center. Expert Paul Henry explains how.
Rackspace hopes its new emphasis on security-centric managed cloud services will be enough to overcome past security and availability problems, as well as differentiate itself from public cloud rivals AWS and Microsoft.
In the cloud, a secure WordPress installation is important to the safety of enterprises. Expert Dejan Lukan provides detailed advice on this process.
Clearly, Apple has noticed the trend toward iOS mobile app management, expanding collaboration with native apps in iOS 8 while also focusing on data security.
With all the EMM products out there, we took a look at major vendors and compared services and prices side by side.
Following a partnership with Microsoft, Dropbox acquired CloudOn and will pull the plug on the collaboration tool, removing an Office alternative.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
India is moving towards a digital future with dreams of smart cities, but Indian IT companies seem to be unconscious to the need for data security
Chinese mobile phone maker Xiaom is to set up a datacenter in India to allay fears over data security raised by the Indian Air Force (IAF).
Detecting fake websites needs to be part of all companies' security strategies, according to security and domain name experts.
With 40 million devices already connected, telecoms regulator Ofcom has published plans to put the UK at the forefront of technological evolution
Sky News is planning to reorganise its digital and television news operations to address the changing digital world
2015 will be the year of Apple Pay, according to the firm's CEO. But will it encourage other tech firms with eyes on the financial services sector?