Mobile devices, virtualization biggest security challenges: survey
Smaller businesses may think they’re immune to threats
Smaller businesses may think they’re immune to threats
The service relies on an IBM software agent being installed on each device intended to be managed
Managed security services are expected to thrive
To support, or not to support, that is the question for IT managers
Lost productivity a major consequence after breaches, surveyed IT professionals said
Battle looms over securing virtualized systems
There’s a need to focus on the crown jewels
To keep IT going in the era of virtualization, smartphones and cloud computing, you’ve got to avoid these mistakes
This stealthy attack infiltration to steal important data has become widespread
The inside story on Lulzsec, the Zeus gangs, Dogma and the Chinese hackers
Verizon Business has given the Cisco PCI 2.0 Architecture with its security components and design the thumb’s up
Customers and business partners are not meeting expectations about secure data-sharing
Symantec Norton is aiming to improve scan time performance by about 10 per cent
A strategic move for RSA that delivers benefits for NetWitness partners
Cloud-authentication service now features advanced controls to let customers more effectively control who gets into corporate applications