Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




IT professionals use best practices to keep corporate, government and other organizations' systems safe.


Software-defined WAN may seem like an ideal solution, but it can also add complexity to a network, and in the end, that can negate its...


Content delivery networks (CDNs) can be a quick and efficient way to deliver your content to users. But they aren't always the best option.


With its security issues and costs, the cloud has seen limited implementation, particularly outside of the business space. But with the...


Penetration testing helps arm system administrators with the information they need to determine acceptable levels of risk in systems and...


With a staggering 65,535 TCP ports being made available on a single IP address it's easy to see why there are so many security exploits on...


Wearables are being used in enterprise more than ever, so with that, one must implement proper security. An appropriate enterprise mobility...


IAM gives the right people the right level of access at the right time -- and that's really important for business.


Spear phishers are baiting their hooks for 'big phish' with access to highly valuable corporate information, a strategy known as whaling.


Implementing IAM - both on the cloud and on-site - can be challenging, but the rewards can make the effort well worthwhile.


When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity.


Much of the world seems to be moving to mobile devices, which makes mobile device management more important than ever. But how do you...


VoIP is well known for its cost effectiveness, but security should be considered before you embark on a VoIP implementation.


So just how safe is your data? Here we take a deeper look at the PKI technology designed to protect it.


Each and every year, new attacks leave behind a new normal in cybersecurity. So what will that look like in 2017? We asked experts to give...


Medical cloud services are making headway in health care with the migration to electronic medical records for doctors and physician...


Security information and event management uses log information to monitor systems and detect threats.


The spread of malware online has made many people fear attachments, apps and even web pages. Find out what kind of malware is out there and...


Passwords can be stolen, and multi-factor authentication can be cumbersome, so what's a good security option? Big-data-based authentication...