Assessing and Managing Risk
Threats and Vulnerabilities
The New York opening of Sony Pictures' upcoming comedy The Interview was canceled after threats emerged from the attackers responsible for its recent data breach.
Expert contributor David Strom takes readers through the ins and outs of this SaaS-based multifactor authentication solution for boosting login security.
Security expert Michael Cobb explains what Open Authorization or OAuth 2.0 is, its pros and cons, and how it is different from bring your own identity.
Microsoft's refusal to give the U.S. government customer emails stored in Ireland will likely have implications for enterprise cloud data privacy and security.
Cloud data loss prevention offers many advantages to enterprises today, but it is not without challenges. Expert Rob Shapland discusses the issues to be aware of.
The VMware ESXi hypervisor, particularly its kernel, offer several security features vital to a secure VMware cloud environment. Virtualization expert Paul Henry reviews the different levels of ESXi security.
IT hopes to lure end users out from the shadows through proactive and reasonable compromise. Some say it may be working.
Although phone tablet hybrids, also known as 'phablets,' aren't perfect, it's becoming clear they're the enterprise technology of the future.
More and more IT departments are deploying, managing and even creating mobile applications. Using the right strategy, mobile apps can be a boon to employee productivity.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
India is moving towards a digital future with dreams of smart cities, but Indian IT companies seem to be unconscious to the need for data security
Chinese mobile phone maker Xiaom is to set up a datacenter in India to allay fears over data security raised by the Indian Air Force (IAF).
Detecting fake websites needs to be part of all companies' security strategies, according to security and domain name experts.
Rob Greig, currently CTO at the Royal Opera House, has been appointed as the first director of the new Parliamentary Digital Service
IT services giant Accenture is recruiting 1,600 people in the UK next year in a wide range of roles spread across the country
Challenger banks such as PayPal are perceived to be less secure than traditional banks when protecting personal data. But is this the case?