Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Properly deployed virtualization techniques can provide security to software, hardware, storage and the network environment. But...


Smart keys may seem like modern marvels of technology, but they're not always as smart as their name implies. Smart keys can cause numerous...


IT journalists and consumers are eager to get their hands on wearable devices, but company IT departments are wary. Here we look at some of...


Want to stay on top of new developments in cybersecurity? Check out this list of people to follow on Twitter.


The cloud is gaining wide popularity as an enterprise tool, but for cloud use to be effective, proper security measures must be taken.


Data breaches can happen to any business, not just the huge nationwide chains you hear about on the news. Small- to medium-sized businesses...


Performance testing often isn't used to its full extent (or not used at all), leaving developers missing out on opportunities to correct...


Get the latest on new threats and privacy concerns in this edition of Web Roundup.


All hard drives will eventually fail. Its what businesses do to ensure they recover their data that matters. Here we look at the key causes...


As technology innovations surge ahead, some apps are falling short on the security side of things. Read about this and more in this week's...


If you're running virtual machines, you may be vulnerable to hyper jumping attacks. But there are precautions you can take to lessen your...


When it comes to mobile technology, there's a delicate balance between staying on the cutting edge and maintaining security. With this...


Digital IP can make or break a company, and its theft and misuse can be disastrous. Here we examine some low-tech ways to keep your IP out...


In software development, focus is shifting from eliminating bugs to fixing flaws, many of which happen again and again. Here are the top 10...


Data security is as important as ever, especially in business. But who is responsible for that security when data is stored in the cloud?


Data is constantly being generated, especially from social media and the up-and-coming Internet of Things. But who owns that data? And what...


The security of businesses and their customers is under scrutiny, meaning a greater need for security professionals. That starts with a...


Edward Snowden's revelations of government access to personal data has cast suspicion on just how secure "encrypted" data really is. Can...


Google tries to make end-to-end email encryption simple to use. It will be, but there are caveats. Learn more about it here.