Cloud computing provides numerous benefits, including cost savings. Here's how to avoid creating security risks in the process.
Want to beef up the security of your enterprise -- without impacting network performance? Sourcefire senior director of product management Jason Lamar discusses next-gen firewall strategies.
More than 1,200 new rootkits are detected each day. Here's how security experts combine hardware and software techniques for a new layer of protection.
Multicore processers are increasingly common in everything from PCs to smartphones -- and increasingly attractive to hackers. Cambridge University researcher Robert Watson explains the threats and how enterprises can mitigate them.
Maximizing both user demand and corporate information security is a balancing act. Here's a look at how IT can manage to accomplish that.
Developers unite software and hardware-based security to reinforce laptop, web site defenses.
How to deploy encryption when its performance might otherwise be impractical.
Structured Query Language is one of the most popular ways hackers attack enterprises. Programmer and trainer Paul Litwin tells you how to identify weaknesses before hackers do.
Russian-based IP accounts drive 10 percent of attacks, most of which target port 445.
Faster, denser and greener has been the mantra for data center design for years, but collocation and virtualization are among the new must-watch strategies.
Lost data and the risk of a data breach have exceedingly serious financial implications for companies.