Ask the Expert - Some people believe that if IP addresses from China are attacking their network, then they are under attack from China. Expert John Strand explains why all that it is irrelevant. 01 April 2009
Ask the Expert - Information security threats expert Ed Skoudis weighs the positive and negative aspects of allowing social engineering tests to be a part of the penetration testing process. 02 April 2008
The VMware ESXi hypervisor, particularly its kernel, offer several security features vital to a secure VMware cloud environment. Virtualization expert Paul Henry reviews the different levels of ESXi security.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.