No, this is not the start of a sci-fi story; it is the reality that enterprise IT security defenders face in 2014.
Latest security trends—from malware delivery to mobile device risks—based on data and ongoing research from the IBM X-Force Research team on today’s security threat landscape. Wherever you go, attackers will follow as security attacks are...
The Microsoft security update for January 2014 dishes up a relatively small collection of patches, but it's a valuable set. The KB2916605 patches for Microsoft Word and Web Applications fix three vulnerabilities, all of which provide Remote Code...
The situation described here does not come from the ivory tower; instead it comes from the real world and shows how to rapidly and efficiently address a zero-day vulnerability. You are probably already overwhelmed with patching. Alternatively, you...
Cyber criminals are currently exploiting a new zero-day vulnerability that affects all versions of Microsoft's Internet Explorer.
Last week, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors.
Will white-listing or blacklisting better protect your enterprise? We weigh in on the ongoing debate.
Java suffers the most malware infections of any programming language and recent zero-day exploits now warrant removing it from business applications.
Endpoint security can be compromised if employees have permission to make administrative changes on company devices. However, they may still be at risk.
The year just started, but already two major software vulnerabilities have made headlines. One concerns Java. The other is called Operation Red October.