Experts weigh in on how they see security and cultural trends related to the Internet going in the next decade.
What your organization can do to get cloud usage under some semblance of control and even turn issues into assets.
- By Scott Bekker
Don't expect Microsoft to help you keep the aged server OS secure after July 14, 2015.
- By Greg Shields
Microsoft released a new antimalware solution for its various Azure services, including Virtual Machines.
Microsoft gave notice today that it will disable Secure Sockets Layer (SSL) 3.0 support in its Internet Explorer browser and in its Online Services, starting on Dec. 1, 2014.
The growth of employee-owned devices and use of cloud services requires advanced protection. Here are six new and emerging products worth considering.
Cloud usage is rising and so are the number of threats to the security and privacy of your organization's information.
- By John K. Waters
Microsoft plans to step up its security and identity management controls with its next-generation Windows 10 operating system.
Microsoft is offering more guidance regarding a Secure Sockets Layer 3.0 security flaw.
The new process looks to verify the authenticity of a Google site before users provide their login details.
This month's security update has led to compatibility and installation errors for many users.
Microsoft provided an update today about its future Exchange Online Protection plans.
This month's security offering includes three bulletins rated "critical" and five "important" items.
Internet Explorer will begin blocking outdated Silverlight ActiveX plug-ins, starting on Nov. 11.
Romanian hackers are targeting the Yahoo Games servers.
IT's security spending is not keeping up with the reported 42.8 million security incidents in PwC's enterprise survey.
Microsoft pitched the business side of Windows 10 today after announcing the upcoming operating system at a San Francisco press event.
Microsoft indicated this week that the patch cycle for Windows 8.x and Windows Server 2012 R.x systems follows a different approach than in the past.
How many cloud-based applications are running in your environment? Probably more than you think, if the results of a new survey of IT and security professionals released last week by the Cloud Security Alliance (CSA) are any indication.
- By John K. Waters
The 25-year-old flaw, which was just discovered on Wednesday, leaves systems running Linux and Mac OS X open to remote code execution attacks.