App security, Messaging security, Web security, OS security, Managing vulnerabilities
Email threats, Cybercrime, Data security, Malware
Network design, Access management, Intrusion management, Endpoint security, Secure remote access
Risk management, Security jobs, Information security market, Newsmakers
Paul Kirvan discusses the importance of creating an after-action report following a disaster recovery exercise and offers tips on creating the report.
Learn why data protection practices common in traditional file storage environments aren't the best option for objects, and how metadata can help.
Learn how different scale-out architectures can be good options for providing high availability and easy growth.
Our 2015 IT salaries survey reveals the average pay for IT pros in the U.S., broken down by role and region of the country, job aspirations, optimism levels, and key tech projects.
Robots are on track to be faster and smarter than humans -- someday they'll be as creative, too, says robotics engineer Hod Lipson. Now is the time to prepare.
Google's new app streaming feature takes mobile deep linking to the next level. Is this good or bad news for developers? Also in SearchLight: Encryption is back in the spotlight following Paris attacks; the Word of the Year is an emoji.
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Learn about bandwidth management vendor Websense's partner program in this standardized checklist.
Learn more about configuration control software vendor Tripwire, Inc.'s partner program in this standardized checklist.
This section of the chapter excerpt focuses on supporting multiple administrative levels of router configuration.