CEO Satya Nadella promised a new approach to enterprise security. Now the company is rolling out upgrades for protecting data stored in Microsoft cloud environments
Fahmida Y. Rashid |
26 Feb |
Read more
Amazon does a great job with infrastructure, but securing your cloud applications and environment is up to you. Here's how
Fahmida Y. Rashid |
05 Feb |
Read more
While most of the fixes for Java, Database, and MySQL are run-of-the-mill, four are rated critical if the targeted user has administrator privileges
Fahmida Y. Rashid |
22 Jan |
Read more
The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead
Fahmida Y. Rashid |
28 Dec |
Read more
Thanks to technical advances and increased adoption, securing your data and communications is a lot easier than you might think
Fahmida Y. Rashid |
14 Dec |
Read more
Do as I say, not as I do: Admin mistakes often surpass the severity of those made by users. Here are 10 of the most common -- and their remedies
Fahmida Y. Rashid |
18 Nov |
Read more
Do you like audio and video on your Android device? They lie at the heart of recent vulnerabilities in Google's latest security update
Fahmida Y. Rashid |
06 Nov |
Read more
Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all
Fahmida Y. Rashid |
02 Nov |
Read more
Some products will be replaced, but admins will need to start over for setup and configuration
Fahmida Y. Rashid |
26 Oct |
Read more
The bad news: Java and Oracle's database products had lots of vulnerabilities. The good news: None are currently under attack
Fahmida Y. Rashid |
21 Oct |
Read more
A survey of major industries reveals health care organizations are below average in secure coding
Fahmida Y. Rashid |
20 Oct |
Read more
The latest zero-day vulnerability in Flash Player is currently under attack by Pawn Storm. Sit tight for an emergency patch next week
Fahmida Y. Rashid |
15 Oct |
Read more
Hackers create fictional people on LinkedIn to engage in industrial espionage and social engineering attacks
Fahmida Y. Rashid |
12 Oct |
Read more
Two new Amazon cloud products proactively deal with security issues before they become security and compliance problems
Fahmida Y. Rashid |
08 Oct |
Read more
Why spend time targeting Active Directory for domain credentials when Outlook Web Application is just as good -- and far easier to compromise?
Fahmida Y. Rashid |
07 Oct |
Read more