Find best practices for improving your network monitoring strategy and learn how to simplify network management, prevent intrusions and improve visibility with monitoring switches.Click Here
Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Video: Gartner's Jay Heiser says recent attacks on cloud providers show enterprises and business units must manage cloud security requirements.
The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.
Verizon bolstered its cloud security presence with a new web application firewall. The cloud-based WAF puts the telecom giant in the growing cloud firewall market with Akamai, Imperva and others.
Enterprise mobility expert Brian Katz offers advice to help businesses choose the right vendor to meet their needs. Feature breadth, deployment model and support for new operating systems should all factor into the decision.
Samsung forges ahead with Knox EMM, despite a free Knox knockoff coming in Google Android L.
Microsoft's decimation of Nokia's devices and services business allows the company to focus on Windows Phone in the future.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
It seems like an obvious step, but one missed security update, patch or hot fix could spell disaster for Exchange.
As long as security remains a common concern for enterprise consumers, cloud providers must work hard to prove that they deserve their customers’ trust.
More than 25% of large digital marketplaces will have explicit strategies for consumer computing and security by 2018, according to Gartner
The government has confirmed plans to standardise document formats and has resisted Microsoft lobbying by rejecting its preferred standard
Daimler has signed a multi-year agreement with Infosys to run its datacentre operations in Europe
The National Audit Office has warned HM Revenue and Customs (HMRC) about the challenges it will face moving away from its Aspire IT contract