Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Data security is more important than ever, and encryption is one of the primary methods of securing data. Here we discuss some best...


Online privacy and security are big concerns these days, but protecting yourself online is easier than you might think.


Cell phone hacking has become a real concern with the widespread use of smartphones. Learn about how hackers get into your phone and what...


Hackers have a bad reputation, but these tech renegades actually do serve a purpose.


Software-defined WAN may seem like an ideal solution, but it can also add complexity to a network, and in the end, that can negate its...


Content delivery networks (CDNs) can be a quick and efficient way to deliver your content to users. But they aren't always the best option.


With its security issues and costs, the cloud has seen limited implementation, particularly outside of the business space. But with the...


Penetration testing helps arm system administrators with the information they need to determine acceptable levels of risk in systems and...


With a staggering 65,535 TCP ports being made available on a single IP address it's easy to see why there are so many security exploits on...


Wearables are being used in enterprise more than ever, so with that, one must implement proper security. An appropriate enterprise mobility...


IAM gives the right people the right level of access at the right time -- and that's really important for business.


Spear phishers are baiting their hooks for 'big phish' with access to highly valuable corporate information, a strategy known as whaling.


Implementing IAM - both on the cloud and on-site - can be challenging, but the rewards can make the effort well worthwhile.


When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity.


Much of the world seems to be moving to mobile devices, which makes mobile device management more important than ever. But how do you...


VoIP is well known for its cost effectiveness, but security should be considered before you embark on a VoIP implementation.


So just how safe is your data? Here we take a deeper look at the PKI technology designed to protect it.


Each and every year, new attacks leave behind a new normal in cybersecurity. So what will that look like in 2017? We asked experts to give...


Medical cloud services are making headway in health care with the migration to electronic medical records for doctors and physician...