Please turn on your JavaScript for this page to function normally.
The fundamental failure of endpoint security

According to Stefan Frei, Research Analyst Director with Secunia, it’s not the vulnerabilities in Microsoft’s products we should worry about, but those in …

Security concerns around “backdoor” mobile devices

Employee owned, “backdoor’ mobile devices entering the corporate network highlight ongoing security challenges with enterprise mobility, according to Mformation. …

The complex world of endpoint security

Jeff Melnick is a Sales Engineer at NetWrix Corporation and in this interview discusses the intricate world of endpoint security, offers tips for IT security managers dealing …

Growing focus on endpoint security

90% of business leaders are investing in resources to better manage the security of their endpoints, including servers, PCs and laptops, according to IBM. Over half of those …

App-blocking whitelisting that complements antivirus software

GlobalSCAPE announced that the company is developing appShield, an new computer security product for home and small business computers. AppShield is based on proven …

Hardware keyloggers found on library computers

Public computers are usually not the best way to check your banking accounts, do online reservations or shopping. But, for people who don’t have access to a computer at …

Central management of self-encrypting hard drives

Lenovo and WinMagic announced SecureDoc for Lenovo, a full-disk encryption solution for central management of new self-encryption hard drives that meet the Opal standard …

The vulnerability species: Origin and evolution

There is an on-going arms-race in the IT security industry between vendors striving to produce secure software, and researchers’ and cybercriminals’ efforts (and …

A global shift in cybercrime

The target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices, according to a new report. Research from SpiderLabs found that …

Endpoint security: The year ahead

Predicting the distant future of IT security is tricky, but the near future – the next 12 to 18 months – is a little easier. After all, the seeds of what is to …

McAfee provides unified endpoint management

McAfee released Enterprise Mobility Management 9.5 which includes integration with the McAfee ePolicy Orchestrator platform, providing customers with unified management of …

Growing mobile workforce will increase security complexity

IT security administrators anticipate a significant increase in the number of users connecting to their network in the next year, with 54% citing specific growth in the number …

Don't miss

Cybersecurity news