Security | News, how-tos, features, reviews, and videos
Storm is the only smartphone currently managed via already existing software, but that doesn't mean it is an automatic win for the corporate world
Key Management Interoperability Protocol is seen as one way to replace the hodgepodge of different encryption-key management products out there
Microsoft's monthly software security patch also include "important" updates for SQL Server and Visio
Datagent security device is intended to monitor and restrict use of USB storage devices and access to networks based on defined user privileges
IE vulnerabilities should be given the highest priority and patched first -- daily if necessary, Qualys CTO argues
Flaw in an ActiveX control used to load third-party apps onto BlackBerrys leaves Windows PCs vulnerable to attack
Malicious Software Removal Tool that ships with Windows now detects Srizbi botnet code
InfoWorld testing reveals key differences in platform support, security features, and reporting functions among Check Point, McAfee, Sophos, Symantec, and Trend Micro solutions
IT managers are often hampered in their efforts to safeguard data because they buy into one or more of the six myths of movable media
If you guessed hackers or even trouble-making insiders are the No. 1 threat, you'd be wrong