App security, Messaging security, Web security, OS security, Managing vulnerabilities
Email threats, Cybercrime, Data security, Malware
Network design, Access management, Intrusion management, Endpoint security, Secure remote access
Risk management, Security jobs, Information security market, Newsmakers
Paul Kirvan discusses the importance of creating an after-action report following a disaster recovery exercise and offers tips on creating the report.
Learn why data protection practices common in traditional file storage environments aren't the best option for objects, and how metadata can help.
Learn how different scale-out architectures can be good options for providing high availability and easy growth.
Before dressing up brick-and-mortar locations with customer-facing technology, CIOs need to integrate IT systems.
IT leaders need to make tough choices on where to focus their efforts. Running the data center of the future won't be on Niel Nickolaisen's agenda.
Samsung is hoping to capitalize on the burgeoning IoT market with the launch of Artik. Also in Searchlight: Google's self-driving cars are set to hit the road this summer; Verizon buys AOL.
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.
Banks are rushing to fix sloppy authentication processes at the heart of rising Apple Pay fraud. Experts also worry about potential fraud with other mobile payment systems.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Learn about bandwidth management vendor Websense's partner program in this standardized checklist.
Learn more about configuration control software vendor Tripwire, Inc.'s partner program in this standardized checklist.
This section of the chapter excerpt focuses on supporting multiple administrative levels of router configuration.