Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




VoIP is well known for its cost effectiveness, but security should be considered before you embark on a VoIP implementation.


So just how safe is your data? Here we take a deeper look at the PKI technology designed to protect it.


Each and every year, new attacks leave behind a new normal in cybersecurity. So what will that look like in 2017? We asked experts to give...


Medical cloud services are making headway in health care with the migration to electronic medical records for doctors and physician...


Security information and event management uses log information to monitor systems and detect threats.


The spread of malware online has made many people fear attachments, apps and even web pages. Find out what kind of malware is out there and...


Passwords can be stolen, and multi-factor authentication can be cumbersome, so what's a good security option? Big-data-based authentication...


The battlefield no longer has to be a physical space - war is now taking place in cyberspace. White hat and grey hat hackers combat...


Humans are increasingly relying on machines, but these machines still rely on human input and supervision in order to be effective.


From the day that digital rights management was implemented, there have been entities determined to find ways around it. Is DRM worth the...


Most people in the U.S. have been receiving new credit cards with embedded EMV chips, but not everyone knows the facts about them.


IT is vital to business, which means that ensuring its security should be a top priority. If you're not following these guidelines, you may...


Cloud sprawl -- the unauthorized use of cloud services in an organization -- can be particularly problematic for an IT department. Here are...


With an influx of mobile devices in the workplace, mobile security is more important than ever. Make sure that your devices are secure with...


Data theft is an ever-growing problem, but the combination of big data and Hadoop promises to help identify it before it can do any harm.


Fraud is the leading cause of financial loss in the banking industry. However, the combination of Hadoop with machine learning has the...


Secure networks are critical for business. Here security experts share some of their secrets.


While we welcome the latest technological advances into our lives, they may be providing our private information to others. What should we...


Protecting your personal computer isn't that difficult, right? Well, protecting all of the machines in your enterprise can be nearly as...