Find best practices for improving your network monitoring strategy and learn how to simplify network management, prevent intrusions and improve visibility with monitoring switches.Click Here
RHEL virtual machines hosted in Microsoft Azure were recently found to have significant security vulnerabilities. Expert Rob Shapland explains them and what enterprises can learn.
A cloud risk assessment can often fall by the wayside in an enterprise, but using a standard or framework can simplify it. Expert Dave Shackleford discusses the options available.
At RSA Conference 2017, Tenable Network Security introduced a cloud-based vulnerability management platform called Tenable.io that allows users to import and export vulnerability data.
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Unscrupulous cloud providers can use security controls to make it hard to switch vendors. Know the questions to ask to avoid cloud lock-in.
Learn how security big data initiatives support enterprise information security and how to prepare for a big data collection implementation.
Compare data anonymization techniques including encryption, substitution, shuffing, number and data variance and nulling out data.
Expert Matt Pascucci advises a reader on securing big data with tips for building security into enterprise big data architectures.
Experts say physical security, encryption and tokenisation can enhance the security of connected things
There is a thriving virtual reality industry in the Middle East, with the technology's application expected to go far beyond gaming
RBS Group is putting a digital expert in every NatWest and RBS branch in 2017