Assessing and Managing Risk
Threats and Vulnerabilities
Microsoft Windows configuration and patch management, Microsoft endpoint security management, Microsoft identity and access management, Microsoft security integration and centralized management, Microsoft security threat management
A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.
Bigger, more diverse networks mean a larger attack surface for hackers. Today's networking pros must update security strategies to account for new vulnerabilities and respond to inevitable attacks. But first, they need a clear view into their network.
An infosec consultancy has claimed that a Heartbleed exploit was used by attackers to gain access as part of the Community Health data breach.
Amazon EBS encryption is now offered by AWS. Expert Dave Shackleford explains how it works, why companies might struggle with it and whether it brings the industry one step closer to default cloud data encryption.
Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.
Virtual DMZ cloud configurations require specific security tactics. Expert Dejan Lukan looks at the different types of virtual DMZs and how they differ from physical DMZs.
Enterprise app stores provide user access to mobile applications. To create an enterprise app store successfully, IT must consider manageability, licensing and cross-platform compatibility.
With Glass for Work, Google aims to overcome the challenges the "smart glasses" have faced in the consumer marketplace. The new focus on enterprise could help field workers, manufacturers and engineers get more done hands-free.
Desktop management software and cloud backup tools give IT pros a way to ensure employees always have access to corporate data, even when their devices fail. But they approach these goals in very different ways.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
Arguably the most important task of any endpoint security system is to protect against malware. However, these products are less effective as attackers develop increasingly novel ways of sidelining device security.
Indian organizations are waking up to the risks that weak security causes as business becomes digitized
A major digital project at the Land Registry is at risk after two key executives on the programme left due to their tax arrangements
VMware has rebranded its infrastructure-as-a-service offering vCloud Hybrid Service (vCHS), to VMware vCloud Air
A “top data scientist” competition, sponsored by analytics company SAS, is training its focus on a UK energy crisis