New & Notable
Client security News
July 02, 2014
Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity.
March 21, 2014
Experts say firing Steve Bennett overshadows the larger problems with the Symantec strategy, namely the company's lack of focus on security.
January 16, 2014
Software giant Microsoft will extend Windows XP antivirus updates past the XP end-of-life date, but security patches are still slated to end in April.
September 20, 2013
HP's new SureStart feature detects and 'heals' corrupted BIOS code.
Client security Get Started
Bring yourself up to speed with our introductory content
The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet. Continue Reading
Shadow apps are software-as-a-service (SaaS) applications that are used on business networks but are not supplied by the IT department or even visible to them. Shadow apps are often collaborative software, such as unified communication and ... Continue Reading
TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distribution of an operating system on some bootable ... Continue Reading
Evaluate Client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Sandboxing is a limited technology. Expert Brad Casey explores the margins and supplemental products organizations can use in virtual environments. Continue Reading
Does the combination of the Trusted Platform Module and Windows 8 create the threat of a backdoor? Michael Cobb discusses. Continue Reading
More mobility means more endpoints to secure. This guide reviews the mobile security challenges and solutions enterprise security pros must consider. Continue Reading
Manage Client security
Learn to apply best practices and optimize your operations.
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ignored. The web of interconnected devices promises both enormous benefits to users and serious ... Continue Reading
A survey revealed 54% of enterprises don't know if they use code-execution prevention on networked endpoint devices. Does your organization? Continue Reading
Expert Brad Casey offers a number of best practices to help your organization ensure network and endpoint security in a BYOPC era. Continue Reading
Problem Solve Client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Video: Karen Scarfone of Scarfone Cybersecurity explains why mobility may be the biggest challenge facing enterprise endpoint security. Continue Reading
Expert Brad Casey details how advanced malware detection products rely heavily on sandboxing technology, though it's not a cure all for enterprises. Continue Reading
U.S.-based CounterTack in agreement to protect South Korean security firm SK Infosec's endpoints from increasingly stealthy cyberattacks. Continue Reading