The information security pro’s resource for keeping corporate data, applications and devices secure
Download Now!In this guide, get tips and advice on user authentication and authorization methods and services: biometrics, two factor and multifactor authentication, single sign-on (SSO), smartcards, PKI.
When storing data in the cloud, ignoring the physical location of cloud data is a major mistake. Learn how to prevent data location security issues.
A custom cloud infrastructure requires a special set of security controls. Get advice on how to implement hybrid cloud security the right way.
They're not perfect, but SOC 2 reports are becoming the baseline for cloud provider security assessments. Expert Dave Shackleford discusses.
One big debate right now is whether employees should use local applications or mobile Web-based services. There are use cases for each kind of app.
Organizations are warming up to NAC security products due to popularity of BYOD for robust device security and better systems integration.
Managing endpoints in the BYOD era isn't easy, and you have to come at it with the right attitude. Focus more on access and less on device control.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
A session by a team of crypto experts at Black Hat USA 2013 argued that RSA and Diffie-Hellman should be abandoned in favor of ECC.
Firewalls and antivirus are ineffective in the face of APT attacks. Expert Nick Lewis offers suggestions for advanced persistent threat protection.
In biggest security acquisition since 2011, Cisco has announced it will buy IDS maker Sourcefire for $2.7 billion.
The Indian banking system is at the begining of a new era, driven by mobile technology, but the widening of access to banking services brings with it security risks
Automation is the most effective way to tackle multiple prolonged cyber attacks on web applications, a study has confirmed
BlackBerry is ready to provide Indian law enforcement authorities with a way to track emails, email attachments and chats sent over its services
The government wants to put half of all new IT spending through small IT suppliers – doubling the previous target
Mike Timlett's career as an IT director has tracked the rise of mobile technologies that empower new business processes
Cisco is launching its National Virtual Incubator to harness innovation and incubation across the UK.