Find best practices for improving your network monitoring strategy and learn how to simplify network management, prevent intrusions and improve visibility with monitoring switches.Click Here
Knowledge is power, which is why cloud reconnaissance and enumeration are key when it comes to securing the cloud. Expert Frank Siemons explains why and how to do it.
Storing data in the cloud isn't a sure-fire ransomware defense method. Expert Rob Shapland examines how the cloud helps and hurts when it comes to ransomware attacks.
Cloud service providers can perform HTTPS inspection, despite warnings from US-CERT. Expert Ed Moyle looks at what this technique does and what the security implications are.
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
Expert Nick Lewis details how automated exploit kits are evolving and offers mitigations for the latest methods employed by these attack toolkits.
A survey released by WhiteHat Security finds that website vulnerabilities have decreased steadily in recent years, though problems persist.
There's no place to hide as new cyberthreats and tried-and-true hacking techniques test security teams.
Transferring large files safely can be a costly process. Matt Pascucci offers low-cost options for secure, large file transfers in the enterprise.
Trojan highlights need to tune automated detection systems to spot malicious software attempting to use Windows hooks, expert says.
The findings of a new report by Siemens and Intel suggests datacentre managers are taking a reactive approach to keeping on monitoring and managing the health of their infrastructure
IT security is hindering productivity and innovation across enterprises, research has revealed
Intelligence commissioners did not need technical expertise or support staff to check whether GCHQ and MI5 were lawfully sharing huge databases, court told