While VMware users harbor little doubt about the cost savings and productivity gains brought by virtualizing their networks, security concerns still exist.
Cybercriminals increasingly are targeting business bank accounts to set up fake money transfers. But the good news is, banks seem to be getting better at...
The White House pledged to work with industry to establish an "identity ecosystem" of approved processes and technologies to foster some kind of new way to issue digital credentials to end users, whether consumers, business and the federal government.
Amag Pharmaceuticals, based in Lexington, Mass., has almost eliminated its internal server network, and couldn't be happier about it. That's because the company, with about 240 employees, is now largely riding on cloud services.
A committee of the Payment Card Industry offered guidelines to help those processing payment cards use new technologies to conceal customers' sensitive account information.
Even as the shadowy hacker group Anonymous threatens to take on the mighty social-networking site Facebook, claiming the group will 'kill' Facebook on Nov. 5, some researchers are criticizing Facebook security, saying it could be better.
Visa today announced plans that will let qualifying merchants in the U.S. eliminate the need to annually validate their compliance with the Payment Card Industry data standard.
Ready to power on next week, the annual Black Hat Conference in Las Vegas promises to be the high-voltage event
About 100,000 Web pages for e-commerce sites based on the open source OS Commerce software have been compromised with malware through a mass iFrame injection.
Increasingly, businesses accept the idea that employees should be able to use their personal mobile devices, such as smartphones and tablets, for work. But...
It's fairly simple to find corporate or consumer printers and scanners online and, without breaking into them, get a hold of documents that these devices...
Like cleaning the windows, IT security can be a thankless task because they only notice when you don't do it.
Cisco has affirmed that it has no intention of pulling back from its commitment to its new security architecture.
The move to almost fully virtualized computing environments is driving a fresh approach to security in the enterprise.
These "hactivists" steal confidential data in order to expose information about their targets, or they simply disrupt them. Here's an introduction to their diverse missions and methods.