Editors' Picks
-
Will Firefox security improve with browser plug-in check?
Will Mozilla's possible support of a browser plug-in check improve Firefox security? Expert Nick Lewis discusses the pros and cons of the feature.06 Nov 2012
-
The security benefits of silent updates: Timing is everything
In light of the increasing popularity of silent updates, expert Michael Cobb examines their security and application-compatibility implications.27 Aug 2012
-
Mozilla ships Firefox 6; patches 10 major security holes
Mozilla team releases Firefox’s latest version, with fixes for 10 serious vulnerabilities in addition to over 1600 changes made to the existing framework.17 Aug 2011
-
Mozilla proposes Firefox Do Not Track feature to boost browser privacy
The proposal, which transmits a special HTTP header to websites, may be supported in future versions of Firefox, but in order for it to fully work, websites must also support the feature.24 Jan 2011
-
20 days to a more secure enterprise
Desktop administrators can improve the security of their organizations by doing a little each day. Learn how small steps can help you keep up.25 Nov 2009
More Like This
-
EMC Corp. prepares VNX2 launch
EMC sees the VNX2 unified midrange storage array upgrade and other product launches as a way to jolt stagnant storage sales.25 Jul 2013
-
Is Firefox PDF reader a secure alternative to Adobe Reader?
Expert Michael Cobb examines Mozilla’s Firefox PDF reader and discusses whether it is more secure than Adobe Reader.24 Jun 2013
-
Microsoft Corp. Windows Server 2012
Microsoft Corp. Windows Server 2012 features SMB 3.0, the Resilient File System, Storage Spaces and Hyper-V Replica disaster recovery.13 Feb 2013
-
Aveksa acquisition expands RSA's intelligence-driven security strategy
Aveksa acquisition should help RSA compete in burgeoning identity management market.09 Jul 2013
-
Western Digital Corp., Synology announce new SMB products, services
Western Digital Corp., Precision IT, Synology and Google announce products aimed at the small- and medium-sized business market.21 May 2013
-
Third-party risk management: Horror stories? You are not alone
The majority of breaches occur as the result of third parties. MacDonnell Ulsch advises companies to safeguard third-party management agreements.01 Aug 2013
-
RSA warns about 'KINS' banking Trojan
RSA is warning that a new banking Trojan, 'KINS,' with architectural similarities to previous Trojans, may start hitting PCs soon.24 Jul 2013
-
The advantages of digital watermarking in enterprise data protection
Expert Michael Cobb explains the advantages of digital watermarking and analyzes whether improved data security is one of them.16 Jul 2013
-
Two-factor authentication options, use cases and best practices
It may seem daunting, but two-factor authentication options are manageable for nearly all enterprises. Learn how to get started in this 2FA primer.11 Jul 2013
-
Mozilla announces handsets for Firefox OS
Alcatel, LG and ZTE will be the first mobile manufacturers to bring Firefox OS handsets to the market24 Feb 2013
-
RSA Silver Tail improves online fraud detection, enterprise security
Fraud prevention for the Web: RSA Silver Tail sets stage for enterprise-level security with big data and brand new interface.19 Jun 2013
-
Mullen: Cybersecurity threats demand leadership from Capitol Hill
Adm. Mike Mullen criticized U.S. politicians for a lack of leadership on vital cybersecurity issues and called the NSA PRISM leak a 'huge breach.'11 Jun 2013
-
QLogic Corp. FlexSuite 2600 Series Fibre Channel Adapters
The QLogic 2600 Series Fibre Channel Adapters supports 16 Gb Fibre Channel and standards-based virtualization features such as NPIV.13 Feb 2013
-
IT certification guide: Vendor-specific information security certifications
Updated for 2013, experts Ed Tittel and Mary Lemons guide you through the crowded field of vendor-specific information security certifications.23 May 2013
-
SIEM best practices for advanced attack detection
SIEM struggles are common, but Mike Rothman explains why SIEM products are critical for advanced attack detection, and offers a SIEM tuning step-by-step.08 May 2013
Security Management Strategies for the CIO