Clicking on a PDF in your email in-box can be lead to series of security headaches. Lisa Phifer provides tips to protect yourself from PDF-based malware.
In early...
The year's RSA security conference -- as always -- revealed the biggest trends in enterprise security. Lisa Phifer reports.
At last week's RSA Conference, dozens of network hardware,...
Websites that spread malware may be leveling off, but Web-borne malware encounters are still growing. According to a 2Q10 Global Threat Report published by Cisco, criminals are...
After a devastating wrong turn with Vista, Microsoft is back on its game with Windows 7. Sure, Windows 7 has annoyances – such as touting attractive features,...
Gone are the early days of Wi-Fi, when CSOs lost sleep over threats like WEP cracking and war driving. 802.11n products have matured to the point where...
From stolen devices and phishing attacks to buggy apps and human blunders, 2009 was another banner year for data breaches. According to the Privacy Rights Clearinghouse, over...
Wireless High Def TV. Internet audio/video content navigation and delivery. IP multi-media storage and streaming. Digital photo frames and netbooks. At CES 2009, Wi-Fi was...
El Centro Regional Medical Center's Director of IS John Gaede intends to use innovative medical technologies to transform healthcare. "We can attack escalation in healthcare cost by...
Before Wi-Fi can displace Ethernet as the LAN access method of choice, enterprises must learn how to accurately plan, budget, provision, troubleshoot, and tune WLANs. To facilitate...
After a full year of draft 802.11n deployment, we've reached the point where all major technical challenges have been resolved and enterprise WLANs run as well-oiled machines—right?
Â
Of...
As a mission critical service, VoIP deployments require careful assessment to identify and eliminate security vulnerabilities in VoIP clients, applications, and infrastructure. But what exactly...