Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Network virtualization is quickly becoming a security tool, but one must understand it and avoid common mistakes in order for it to be...


Enterprise security is a multifaceted endeavor, often requiring multiple tools to protect against threats. OpenDNS is a tool that attempts...


Ransomware can cripple a business, but what can you do about it? Security experts weigh in on options.


Properly deployed virtualization techniques can provide security to software, hardware, storage and the network environment. But...


Smart keys may seem like modern marvels of technology, but they're not always as smart as their name implies. Smart keys can cause numerous...


IT journalists and consumers are eager to get their hands on wearable devices, but company IT departments are wary. Here we look at some of...


Want to stay on top of new developments in cybersecurity? Check out this list of people to follow on Twitter.


The cloud is gaining wide popularity as an enterprise tool, but for cloud use to be effective, proper security measures must be taken.


Data breaches can happen to any business, not just the huge nationwide chains you hear about on the news. Small- to medium-sized businesses...


Performance testing often isn't used to its full extent (or not used at all), leaving developers missing out on opportunities to correct...


Get the latest on new threats and privacy concerns in this edition of Web Roundup.


All hard drives will eventually fail. Its what businesses do to ensure they recover their data that matters. Here we look at the key causes...


As technology innovations surge ahead, some apps are falling short on the security side of things. Read about this and more in this week's...


If you're running virtual machines, you may be vulnerable to hyper jumping attacks. But there are precautions you can take to lessen your...


When it comes to mobile technology, there's a delicate balance between staying on the cutting edge and maintaining security. With this...


Digital IP can make or break a company, and its theft and misuse can be disastrous. Here we examine some low-tech ways to keep your IP out...


In software development, focus is shifting from eliminating bugs to fixing flaws, many of which happen again and again. Here are the top 10...


Data security is as important as ever, especially in business. But who is responsible for that security when data is stored in the cloud?


Data is constantly being generated, especially from social media and the up-and-coming Internet of Things. But who owns that data? And what...