New Azure tool helps IT tame SaaS apps
Microsoft Cloud App Security reveals shadow IT and authorized cloud app usage, along with security controls to manage access
Microsoft Cloud App Security reveals shadow IT and authorized cloud app usage, along with security controls to manage access
The stored XSS vulnerabilities in vReader affected only some versions, but could result in code execution
Ransomware attacks are on the rise. Here are four good reasons why you shouldn't pay to get your data back -- and one reason why people do
Introducing the 'Treacherous 12,' the top security threats organizations face when using cloud services
Google continues its monthly security update cycle for Android, fixing nearly 20 vulnerabilities in the latest bulletins
NSA chief Michael Rogers argues against a presidential commission's proposal to restrict the NSA to foreign intelligence, and asks the tech industry for help
The DROWN attack decrypts TLS sessions on servers supporting SSL v2 and using RSA key exchange
CEO Satya Nadella promised a new approach to enterprise security. Now the company is rolling out upgrades for protecting data stored in Microsoft cloud environments
Amazon does a great job with infrastructure, but securing your cloud applications and environment is up to you. Here's how
While most of the fixes for Java, Database, and MySQL are run-of-the-mill, four are rated critical if the targeted user has administrator privileges
The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead
Thanks to technical advances and increased adoption, securing your data and communications is a lot easier than you might think
Do as I say, not as I do: Admin mistakes often surpass the severity of those made by users. Here are 10 of the most common -- and their remedies
Do you like audio and video on your Android device? They lie at the heart of recent vulnerabilities in Google's latest security update
Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all