3 places security vulnerabilities are hiding now

When it comes to plugging security vulnerabilities, IT departments have their work cut out for them. Hackers are always looking for new ways to launch attacks on companies.

Report: Lax software patch management puts most businesses at risk

IT pros know one of the key steps that can help prevent security breaches is making sure all software is up to date. However, many businesses are behind the curve when it comes to software patches, a new report says. 

The top vulnerabilities leaving websites open to hackers

For businesses, web security doesn’t just mean keeping users from accidentally installing malware. IT must also make sure the company’s own sites don’t become compromised and used in cyber attacks. 

The 5 most vulnerable types of software

There are a lot of steps IT departments must take to keep their companies’ data secure. One critical activity: making sure all software on servers and user machines is kept up to date.

Report: Most IT security software is vulnerable to attack

Any software IT installs can potentially contain vulnerabilities that give hackers a way to get on the company’s network – and that includes IT security software, one expert warns. 

DHS: New Java security attacks mean it's time to kill the platform

The latest round of critical Java security bugs and new attacks has IT pros asking a familiar question: Is it time to kill the software platform for good? 

3 most dangerous IT security threats for 2013 – and how to stop them

Most companies are confident their information is secure, but in reality, the data shows most organizations are struggling to deal with emerging IT security threats. 

The top threats facing SMB networks

Keeping networks up and running is a critical job of any company’s IT department. Problems with the network can lead to down time, which in turn may mean lost revenue. 

OS security: Will this firm build the first invulnerable operating system?

Hackers often attack vulnerabilities in operating systems, making OS security one of IT’s top concerns. One company says it has a solution for preventing further attacks: an OS with no security holes. 

Java security attacks on the rise: How can IT limit the risk?

Attacks targeting Java vulnerabilities are common, including the most recent round of attacks that could affect users running any browser in any OS. What can IT do to limit Java security risks?