Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




You don't want others getting their hands on your sensitive data, but at the same time, you don't want to spend the money to get your data...


Rowhammer is a memory problem that could be exploited via the Web. Learn about what it is and what's being done to counter it.


Your online activities could open you up to a world of trouble, like hackers, identity thieves and malware. Here are some tips for keeping...


Big data is a big deal - for both businesses and hackers. Even though big data can be a lucrative target for cybercriminals, there are...


Public Wi-Fi is a modern convenience that many people take for granted. However, tapping into public Wi-Fi could be putting your data at...


Network virtualization is quickly becoming a security tool, but one must understand it and avoid common mistakes in order for it to be...


Enterprise security is a multifaceted endeavor, often requiring multiple tools to protect against threats. OpenDNS is a tool that attempts...


Ransomware can cripple a business, but what can you do about it? Security experts weigh in on options.


Properly deployed virtualization techniques can provide security to software, hardware, storage and the network environment. But...


Smart keys may seem like modern marvels of technology, but they're not always as smart as their name implies. Smart keys can cause numerous...


IT journalists and consumers are eager to get their hands on wearable devices, but company IT departments are wary. Here we look at some of...


Want to stay on top of new developments in cybersecurity? Check out this list of people to follow on Twitter.


The cloud is gaining wide popularity as an enterprise tool, but for cloud use to be effective, proper security measures must be taken.


Data breaches can happen to any business, not just the huge nationwide chains you hear about on the news. Small- to medium-sized businesses...


Performance testing often isn't used to its full extent (or not used at all), leaving developers missing out on opportunities to correct...


Get the latest on new threats and privacy concerns in this edition of Web Roundup.


All hard drives will eventually fail. Its what businesses do to ensure they recover their data that matters. Here we look at the key causes...


As technology innovations surge ahead, some apps are falling short on the security side of things. Read about this and more in this week's...


If you're running virtual machines, you may be vulnerable to hyper jumping attacks. But there are precautions you can take to lessen your...