Despite the growing threat of unmanaged mobile devices, few enterprises are heeding the warning.
Forrester Research Inc. recently reported that only 9 percent of companies...
In his book "Practical Unix and Internet Security," Professor Gene Spafford of Purdue University spells out Spafs first principle of security administration: "If you...
People resent involuntary risks. In studies of the unconscious trade-off thats made between acceptable risk and reward, it appears that an imposed risk seems...
Silex Technology this week will launch new biometric fingerprint readers and authentication software to help safeguard data on PCs, laptops and PDAs.The new devices...
As vendors pour into the internal security market, Check Point Software Technologies Inc., among the first entrants in this space, continues to refine its...
In VirusScan Enterprise 8.0i, McAfee has beefed up its enterprise-grade, host-based anti-virus solution to proactively deal with worms and malware that may not yet...
Check-fraud versions of phishing scams are a possibility once Check 21 becomes law. According to a recent study by Surrey, U.K.-based Next Generation Security...
Continuing a hot streak for e-mail security vendors, IronPort Systems Inc. on Monday announced a $45 million funding round. The San Bruno, Calif., company...
America Online Inc. will support a new, modified version of the Sender ID e-mail authentication specification that is being submitted to the IETF for...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...