Security
This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.
Destroying Data DIY
You don't want others getting their hands on your sensitive data, but at the same time, you don't want to spend the money to get your data...
Should You Worry About Rowhammer?
Rowhammer is a memory problem that could be exploited via the Web. Learn about what it is and what's being done to counter it.
6 Free Ways to Take Control of Your Internet Privacy
Your online activities could open you up to a world of trouble, like hackers, identity thieves and malware. Here are some tips for keeping...
What Technologies Can Counter Big Data Security Threats?
Big data is a big deal - for both businesses and hackers. Even though big data can be a lucrative target for cybercriminals, there are...
Staying Safe When Using Public Wi-Fi Connections
Public Wi-Fi is a modern convenience that many people take for granted. However, tapping into public Wi-Fi could be putting your data at...
How Network Virtualization is Used as a Security Tool
Network virtualization is quickly becoming a security tool, but one must understand it and avoid common mistakes in order for it to be...
Aggregated Security with OpenDNS
Enterprise security is a multifaceted endeavor, often requiring multiple tools to protect against threats. OpenDNS is a tool that attempts...
How Should Businesses Respond to a Ransomware Attack?
Ransomware can cripple a business, but what can you do about it? Security experts weigh in on options.
10 Ways Virtualization Can Improve Security
Properly deployed virtualization techniques can provide security to software, hardware, storage and the network environment. But...
Does a Car Really Need a 'Smart Key'?
Smart keys may seem like modern marvels of technology, but they're not always as smart as their name implies. Smart keys can cause numerous...
Are Wearable Devices a Threat to Corporate Networks?
IT journalists and consumers are eager to get their hands on wearable devices, but company IT departments are wary. Here we look at some of...
Security: Top Twitter Influencers to Follow
Want to stay on top of new developments in cybersecurity? Check out this list of people to follow on Twitter.
5 Big Cloud Security Features for Enterprise Use
The cloud is gaining wide popularity as an enterprise tool, but for cloud use to be effective, proper security measures must be taken.
Why Small Businesses Need to Learn from High-Profile Data Breaches
Data breaches can happen to any business, not just the huge nationwide chains you hear about on the news. Small- to medium-sized businesses...
Performance Testing: The First Line of Security Against Attacks
Performance testing often isn't used to its full extent (or not used at all), leaving developers missing out on opportunities to correct...
Web Roundup: Security Remains a Top Concern
Get the latest on new threats and privacy concerns in this edition of Web Roundup.
Why Data Loss Happens - and What to Do About It
All hard drives will eventually fail. Its what businesses do to ensure they recover their data that matters. Here we look at the key causes...
Web Roundup: Is Technology Costing You More Than You Realize?
As technology innovations surge ahead, some apps are falling short on the security side of things. Read about this and more in this week's...
Virtualization Security: Tips to Prevent VM Hyper Jumping
If you're running virtual machines, you may be vulnerable to hyper jumping attacks. But there are precautions you can take to lessen your...