Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.
There is no such thing as a magic bullet for security. When security vendors push their products too hard, customers grow skeptical of the entire industry.
Security professionals and enthusiasts will have many opportunities to connect with security services experts at IBM InterConnect 2017.
A panel titled "Share Your Services, Not Your Threats" discussed how government departments can share services without sacrificing security.
In the IT security industry, forging a relationship with the client is just as important to the long-term success of a security program as the tools used.
When you hire a third party for some IT work, do you really know about their vendor security practices? Google certainly does.
Security is at the forefront of technology discussions across the globe, as attackers are more sophisticated and organized than ever before. Organizations are turning to services providers for protection against these threats and to avoid the...
Once your security program is established, you must decide which metrics to measure in order to stay in line with business drivers.
There are six essential practices that should be integrated into security program management in order to create a sustainable and effective service.
Before you deploy your company's security intelligence tool, consider these activities to make your plan as risk-free and productive as possible.