Find best practices for improving your network monitoring strategy and learn how to simplify network management, prevent intrusions and improve visibility with monitoring switches.Click Here
Internet radio company Pandora explains how it found a strategy to embrace shadow IT and still secure cloud app usage within the company.
Docker hosting in the cloud is growing in popularity. Expert Dave Shackleford explains how Docker works and what security troubles enterprises should watch out for.
Following FireEye's new threat analytics platform for Amazon Web Services, are enterprises ready to embrace the benefits of cloud-based threat analytics?
Samsung has answered questions about the future of Knox with three new versions of its EMM product, two of which will be free.
For new members of the workforce, smartphones, tablets and the cloud are a part of life. In some IT departments, however, they're still viewed as disruptive forces. How should today's businesses respond to millennials and technology?
IT departments can benefit from a streamlined PC and mobility management strategy. Technology is still catching up as EMM vendors incorporate PC management.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
US retailer Home Depot is investigating a possible data breach of customer payment card information that is potentially greater than the Target breach.
In an advisory, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
Peterborough City Council (PCC) is launching a cloud-enabled technology strategy to imrprove how it connects with citizens
25% of UK primary schools set to sign up for Code Club with 46% of Tower Hamlet schools on board so far
Michael Dell has outlined the company’s datacentre and cloud strategies