Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Threats are constantly evolving, and so must your security. Here we take a look at some of the most important aspects of modern...


As technology continues to play an ever larger role in our lives, these threats can leave users feeling exposed.


The internet of things (IoT) is growing, and so is the data it produces. Deep packet inspection (DPI) is a method of examining that data in...


Businesses are increasingly turning to public cloud options, but is that the right choice for your data? Learn about 6 of the biggest risks...


Passive biometrics is the use of biometric identity verification without the need for any user input. This can greatly improve security by...


Data security is more important than ever, and encryption is one of the primary methods of securing data. Here we discuss some best...


Online privacy and security are big concerns these days, but protecting yourself online is easier than you might think.


Cell phone hacking has become a real concern with the widespread use of smartphones. Learn about how hackers get into your phone and what...


Hackers have a bad reputation, but these tech renegades actually do serve a purpose.


Software-defined WAN may seem like an ideal solution, but it can also add complexity to a network, and in the end, that can negate its...


Content delivery networks (CDNs) can be a quick and efficient way to deliver your content to users. But they aren't always the best option.


With its security issues and costs, the cloud has seen limited implementation, particularly outside of the business space. But with the...


Penetration testing helps arm system administrators with the information they need to determine acceptable levels of risk in systems and...


With a staggering 65,535 TCP ports being made available on a single IP address it's easy to see why there are so many security exploits on...


Wearables are being used in enterprise more than ever, so with that, one must implement proper security. An appropriate enterprise mobility...


IAM gives the right people the right level of access at the right time -- and that's really important for business.


Spear phishers are baiting their hooks for 'big phish' with access to highly valuable corporate information, a strategy known as whaling.


Implementing IAM - both on the cloud and on-site - can be challenging, but the rewards can make the effort well worthwhile.


When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity.