IT managers may think they do not use software as a service or cloud computing when in fact they outsource their e-mail, anti-spam and anti-virus services. Find out why messaging security is suited for the cloud and why intrusion prevention and firewall functions should happen outside the gateway
A closed application market is not the best way to guard against mobile security threats. How Apple Inc. and Google Inc. differ in their respective approaches to iPhone and Android software developmentrn
Conventional password security rules were obsolete when the first keylogger was built. Consider multi-factor authentication and saving passwords in secure clipboards
Though most small companies surveyed have yet to install DLP, compliance requirements such as PCI are driving larger firms, especially in financial services, to buy the technology. Find out what Nemertes Research predicts
Its failed attempt to control images shows that data leakage is unstoppable in the hands of the many and security controls are useless in the hands of the few