Trustwave's Charles Henderson spoke with Editorial Director Robert Richardson about the company's on-demand penetration testing services.
Video: CSA CEO Jim Reavis recaps the 2013 Cloud Security Alliance Congress, including its SAFECode partnership and Software Defined Perimeter effort.
Nation-states are turning their attacks toward the cloud. One expert explains why he believes security automation is the only viable defense tactic.
We surveyed more than 4,000 IT professionals and the message was clear: Mobile is here to stay and it's growing in the enterprise as 2014 approaches.
Our experts spent 2013 doing their best to keep you in the know about managing mobile devices and consumerization. Check out the year's top 10 tips.
Which tablet should you buy? Our 2013 tablet comparison guide helps you make an informed decision based on what you need.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Version 3.0 of the Payment Card Industry Data Security Standard has few surprises, but a host of new requirements and challenges for merchants.
Enterprises rely on ERP and CRM systems, but they pose a risk if left unpatched. Michael Cobb reviews enterprise application security best practices.
The widespread iOS app vulnerability, which stems from the way many mobile applications handle caching, allows attackers to control an app's content.
CISOs need to re-engineer their organization's current outsourcing process to better ensure the security of data with service providers, according to Forrester
The Indian government has its work cut out hitting its ambitious target of creating half a million cyber-security professionals, with a shortage of specialized courses in institutions across the country
As business demands and rogue users introduce cloud computing security risks into many enterprises, infosec pros understand they must be enablers.
With the recovery of the UK economy still underway, one of the trends in IT management for 2014 is the continued demand for interim CIOs
Eight councils in Greater Manchester sign a £15m contract with BT to bring 39,000 homes high-speed broadband by March 2016
The clinical research delivery arm of the NHS is developing an open data platform using QlikView