Find best practices for improving your network monitoring strategy and learn how to simplify network management, prevent intrusions and improve visibility with monitoring switches.Click Here
( Jul 18, 2014 )
( Jul 01, 2014 )
( Jun 17, 2014 )
( Apr 22, 2014 )
Netskope's Cloud Report shows the average number of cloud apps used in the enterprise is growing -- but the majority of those apps lack proper security and policy controls.
Understanding the risks of cloud computing is key to protecting a cloud-centric enterprise. Ravila Helen White explains the three must-know dimensions of cloud risk.
With cloud attacks rising, enterprises must evaluate their cloud security controls well in advance. Dave Shackleford provides some best defense practices.
Mobile security threats come from unlikely places. In this three-question Q&A, MobileIron's security expert offers simple ways IT admin can provide end users the freedom to work securely from their mobile devices anywhere they choose.
The Surface Pro 2 is quite serviceable as an all-in-one device, but it's not particularly great as a desktop replacement, notebook or tablet. For those still considering a purchase, the Surface Pro 3 addresses many of its predecessor's major flaws.
Evaluate your enterprise mobility needs before considering any EMM vendors. Then ask the right questions about features, support and integration. And make sure to choose a provider that will evolve with the market.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
Indian organizations are waking up to the risks that weak security causes as business becomes digitized
Despite what may be a dangerous new Active Directory "pass the hash" attack variant, Microsoft has downplayed the issue as a technical limitation.
Work on India’s first dedicated cryptology centre will likely now accelerate as the project has gained initial funding of Rs. 115 crore
Amazon’s business strategy is reminiscent of Microsoft's in the 1990s despite changes in market dynamics since then
Wearable technology is a big industry thanks to the ‘quantified self’ movement. It’s now giving a boost to professional sports data analytics professionals
Prime Minister David Cameron has announced £300m government support for a big data human genome mapping project in England