Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network are outside of the fortress? With the flurry of Inte...
With every new wave of hires comes a different security concern.
Forrester Research releases its report on the disaster-recovery-as-a-service companies that lead the market segment.
Standards group recommends removing periodic password change requirements
As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime.
With the Target example as the high-water mark, enterprises need to worry about the lack of security on the part of third-party providers that have access to internal systems.
How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.
Companies hire a third party to scour public databases to make sure employees are not getting into legal trouble that would impact their jobs. But is it ethical?