Version 5 of vSphere introduced single sign-on (SSO) infrastructure, implemented primarily to allow the infrastructure, such as... Tip | SearchVMware.com
The iCloud Keychain supposedly syncs passwords across devices but does so without storing the password in the cloud. How does this work, and what are the security implications?
Answer | SearchSecurity.com
This guide covers Exchange 2013 integration, site mailboxes and licensing changes, and will give admins a thorough introduction to SharePoint 2013. Essential Guide | SearchWindowsServer.com
If your organization is considering or is already using cloud computing services, you may be using one of several cloud deployment models.
Security... Tip | SearchCloudSecurity.com
I saw Mozilla has made a few security improvements to Firefox. It now has a Mixed Content Blocker to help prevent man-in-the-middle attacks. Also, following in the footsteps of Google's Chrome and Microsoft's Internet Explorer, Mozilla has... Answer | SearchSecurity.com
For years, security professionals have been saying “either you have been data breached or you just do not know that you have been data breached.”
Data breaches are now a fact of life together with taxes and... Feature | ComputerWeekly.com
At a time when the software-defined data center promises to blur the lines of IT silos, it's important for server admins get an introduction to SDN. Tip | SearchServerVirtualization.com
Protecting data from unauthorized access while making it available to authorized personnel is the IT security professional's ultimate objective. While simple passwords and basic data protection methods are becoming less effective, technologies... Tip | SearchSecurity.com
The key to transforming the iPad from a consumer device to an enterprise workhorse is the ability to administer the device's configuration.
The iPad has become the standard tablet in the enterprise. Although Android is making inroads and... Tip | SearchConsumerization.com
For adversaries, dissecting enterprise Web applications has become second nature. They often know the weaknesses of... Video | SearchSecurity.com