Security - Page 2

  • Your selection:
  • Tag: Security
  • Remove all
Refine Also By Tag: , Article Type: , Author: , …
  • Tag:
    • Management (178)
    • Software (149)
    • Enterprise (129)
    • Mobility (123)
    • Style (122)
    • More
  • Article Type:
    • News (387)
    • Feature (150)
    • Opinion (94)
    • Analysis (38)
    • How-To (36)
    • More
  • Author:
    • Kevin Parrish (78)
    • Ed Tittel (50)
    • Dan Sullivan (49)
    • James Sullivan (45)
    • Bill Oliver (44)
    • More
Previous Results 21-40 Of 793 Next
Sort by:
  • SANS GIAC Certification Guide: Overview And Career Paths
     SANS GIAC Certification Guide: Overview And Career Paths
    in Feature
    The SANS Institute offers a number of IT certifications in the information security space. This certification guide will help you get started with SANS certs and develop your security career path. Read More
  • Microsoft Authenticator App Now Supports Phone Sign-Ins
    Microsoft Authenticator App Now Supports Phone Sign-Ins
    in News
    The new phone sign-in feature is now available to all Microsoft accounts, offering you a fast and secure way to sign in to your personal account with no password. Read More
  • Best Endpoint Protection: Android Antivirus and Data Security 2017
    Best Endpoint Protection: Android Antivirus and Data Security 2017
    in Best Picks
    We evaluated the Android antivirus and data security features included with leading endpoint protection solutions to bring you our top five picks. Read More
  • 4 Simple Things to Make Your Company More Secure
    4 Simple Things to Make Your Company More Secure
    in Feature
    What should you be worried about, and how can you educate your staff to protect your business? Read More
  • How to Prepare for a Data Breach
    How to Prepare for a Data Breach
    in Feature
    Remote access is a necessity and a risk, and a breach is inevitable. Find out what you can do to combat the problem. Read More
  • What Is Google Titan and Why Do You Need It?
    What Is Google Titan and Why Do You Need It?
    in Review
    Google Titan chip tells everyone that security goes all the way down to the hardware level so that one can rely on the company's cloud suite of services. Read More
  • (ISC)2 Certification Guide: Overview And Career Paths
    (ISC)2 Certification Guide: Overview And Career Paths
    in Feature
    (ISC)2 offers vendor-neutral security certifications with specializations in security architecture, security engineering and security management. This guide will help you get started with (ISC)2's certification ladders and career paths. Read More
  • Microsoft Releases Important Security Updates
    Microsoft Releases Important Security Updates
    in News
    It's time to install some Windows updates. Microsoft has released a big patch you should make sure is installed on your company's systems. The update is called the Cumulative Security Update on Windows 10 or the March, 2017 Security Monthly Quality Rollup Read More
  • Government Sites Don't Meet Basic Security, Speed Standards
    Government Sites Don't Meet Basic Security, Speed Standards
    in News
    Some 92 percent of U.S. government websites failed to meet basic standards for security, speed, mobile friendliness or accessibility, according to a new study by the Information Technology and Innovation Foundation (ITIF). The worst offenders included the Read More
  • Best Free SSO Tools for Small Businesses
    Best Free SSO Tools for Small Businesses
    in Round-Up
    For those companies without the budget to go with a bigger name, consider one of these free options rather than go without one. Read More
  • Report: PowerShell Trojan Uses DNS Queries
    Report: PowerShell Trojan Uses DNS Queries
    in News
    A targeted attack that's delivered by a malicious Word doc was uncovered by researchers at Cisco's Talos threat research group. The PowerShell scripts do a remarkable job of hiding its intentions and uses the Domain Name Service (DNS) to execute. MORE: DD Read More
  • CompTIA Launches New Intermediate-Level Cybersecurity Certification
    CompTIA Launches New Intermediate-Level Cybersecurity Certification
    in News
    CompTIA launched the CompTIA Cybersecurity Analyst (CSA+), which aims to fill the gap between the entry-level Security+ and CompTIA Advanced Security Practitioner (CASP) certifications. Read More
  • Greatest Risk to Remote Access Software Is Credential Theft
    Greatest Risk to Remote Access Software Is Credential Theft
    in Feature
    While vital to many businesses, remote access is not without its security risks. Read More
  • Implementing Single Sign-On (SSO): What You Need to Know
    Implementing Single Sign-On (SSO): What You Need to Know
    in Feature
    After you pick an SSO, you still need to set it up. You'll need to make some big decisions. Learn more about single sign-on solutions here. Read More
  • Best Single Sign-On Solution for Enterprise Businesses
    Best Single Sign-On Solution for Enterprise Businesses
    in Best Picks
    For large enterprise companies, comprehensive SSO software is a must. Okta Identity Management has your bases covered. Read More
  • Too Many Small Businesses Aren't Prepared for a DDoS Attack
    Too Many Small Businesses Aren't Prepared for a DDoS Attack
    in News
    Distributed Denial of Service attacks are on the rise and many small businesses simply aren't prepared. Read More
  • DDoS Attacks: What You Need to Know
    DDoS Attacks: What You Need to Know
    in Reference
    Distributed Denial-of-Service (DDoS) attacks can bring down your network and cost you tons of money. Find out what else you need to know. Read More
  • Kaspersky Rolls Out a New Secure Operating System
    Kaspersky Rolls Out a New Secure Operating System
    in News
    Kaspersky took the wraps off a new secure operating system for network devices, industrial control systems and Internet of Things devices. The company's blog post insists this is not just another version of Linux, and says that the core of this code is se Read More
  • How to Use a Security Key to Lock Down Facebook
    How to Use a Security Key to Lock Down Facebook
    in How-To
    By adding a physical USB key to your security settings in Facebook, you can ensure it's virtually impossible to hack. Read More
  • Make the Business Case for Remote Access Software
    Make the Business Case for Remote Access Software
    in Feature
    Remote access software gives you access to other PCs or endpoints, making customer support or performing IT tasks from an off-site location so much easier. And the right business case can convince the execs of that. Read More
    • Previous
    • 2 / 40
    • 3
    • 4
    • 5
    • 6
    • More pages
    • Next
      • 1
      • 2 / 40
      • 3
      • 4
      • 5
      • 6
      • 7
      • 8
      • 9
      • 10
      • 20
      • 30
      • 40