New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
This white paper discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and...
Traditional antivirus products are based on the idea of distributing threat signatures to endpoints and using the resources of the endpoint systems to compare files with those signatures. If you are evaluating antivirus products, you face a dilemma.
Read this white paper to answer questions about how to:
The European parliament recently voted to extend and strengthen the European Network and Information Security Agency. What does this news mean for Europe's top cybersecurity agency and for the state of emerging threats across Europe?
We talk increasingly about what we have in common - global risks, threats and growing an effective security workforce. But what are the unique characteristics of individual marketplaces? That's a question I hope to answer this week in London.
The hunt for a Boston Marathon bombing suspect that locked down the city caused massive disruption to business operations, but enterprises that had business continuity plans in place hardly missed a beat.
Ignoring a White House threat to veto the Cyber Intelligence Sharing and Protection Act, the House of Representatives overwhelmingly approved the bill known as CISPA, sending the measure to the Senate.
Schnucks, a grocery chain that last month revealed it suffered a POS network attack, now says millions of payment cards were likely exposed. How many stores were affected, and was Schnucks PCI compliant?
To meet Obama administration concerns, the House sponsors of the Cyber Intelligence Sharing and Protection Act amended the bill. But a White House spokesman says those changes didn't go far enough to protect citizens' privacy and civil liberties.
The rush to find qualified IT security professionals to meet current cyberthreats could jeopardize IT systems' security in the not-too-distant future, say two leading IT security experts, Eugene Spafford and Ron Ross.