Ask the Expert - Some people believe that if IP addresses from China are attacking their network, then they are under attack from China. Expert John Strand explains why all that it is irrelevant. 01 April 2009
Ask the Expert - Information security threats expert Ed Skoudis weighs the positive and negative aspects of allowing social engineering tests to be a part of the penetration testing process. 02 April 2008
For new members of the workforce, smartphones, tablets and the cloud are a part of life. In some IT departments, however, they're still viewed as disruptive forces. How should today's businesses respond to millennials and technology?
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.