In this month's SearchSecurity.com screencast (below), Peter Giannoulis of TheAcademyHome.com and TheAcademyPro.com details why the
Requires Free Membership to View
This was first published in August 2009
The information security pro’s resource for keeping corporate data, applications and devices secure
Download Now!Tip
In this month's SearchSecurity.com screencast (below), Peter Giannoulis of TheAcademyHome.com and TheAcademyPro.com details why the
By submitting you agree to receive email communications from
TechTarget and its partners.
Privacy Policy
Terms of Use.

Terms for Whatis.com - the technology online dictionary
This was first published in August 2009
Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.
When storing data in the cloud, ignoring the physical location of cloud data is a major mistake. Learn how to prevent data location security issues.
A custom cloud infrastructure requires a special set of security controls. Get advice on how to implement hybrid cloud security the right way.
They're not perfect, but SOC 2 reports are becoming the baseline for cloud provider security assessments. Expert Dave Shackleford discusses.
One big debate right now is whether employees should use local applications or mobile Web-based services. There are use cases for each kind of app.
Organizations are warming up to NAC security products due to popularity of BYOD for robust device security and better systems integration.
Managing endpoints in the BYOD era isn't easy, and you have to come at it with the right attitude. Focus more on access and less on device control.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
A session by a team of crypto experts at Black Hat USA 2013 argued that RSA and Diffie-Hellman should be abandoned in favor of ECC.
Firewalls and antivirus are ineffective in the face of APT attacks. Expert Nick Lewis offers suggestions for advanced persistent threat protection.
In biggest security acquisition since 2011, Cisco has announced it will buy IDS maker Sourcefire for $2.7 billion.
The Indian banking system is at the begining of a new era, driven by mobile technology, but the widening of access to banking services brings with it security risks
Automation is the most effective way to tackle multiple prolonged cyber attacks on web applications, a study has confirmed
BlackBerry is ready to provide Indian law enforcement authorities with a way to track emails, email attachments and chats sent over its services
The government wants to put half of all new IT spending through small IT suppliers – doubling the previous target
Mike Timlett's career as an IT director has tracked the rise of mobile technologies that empower new business processes
Cisco is launching its National Virtual Incubator to harness innovation and incubation across the UK.
Join the conversationComment
Share
Comments
Results
Contribute to the conversation