Intrusion-prevention system (IPS) vendors have not found it easy to recast their appliances for use in the virtual-machine (VM) environment.
Do utilities and energy companies spend huge amounts for physical security but slight information-technology security?
Social-networking sites and shortened URLs have become the favored technologies for scam artists to lure victims to websites that attempt to push malware.
One in seven information technology companies have not reported data breaches or losses to outside government agencies, authorities or stockholders.
The online travel community TripAdvisor today informed its members that an unspecified portion of the TripAdvisor email list of its membership was stolen.
Anyone using RSA SecurID two-factor authentication tokens for remote access to sensitive information should reconsider using them until RSA, which last week admitted to a major breach of its network, clarifies exactly what was compromised, says NSS Labs.
The day is nearing, many say, when your smartphone will be your wallet, letting you make purchases as stored cash or credit that will be wirelessly accepted.
RSA is scrambling to reaffirm that the strength of its SecurID technology is not diminished.
RSA suffered a sophisticated cyberattack in which attackers obtained some type of information about its SecurID product.
Google is neither confirming nor denying a Bloomberg report Tuesday that the search giant plans to soon start testing a mobile-payment service at stores.
Whitelisting technology that prevents unauthorized software from running on corporate servers and PCs is a way to prevent malware attacks but managing the package keeps the Burton Group, a division of Gartner, from recommending it as a substitute for traditional antivirus software.
Last week's revelation that over 50 apps in the Google Android market were malware-laden has shaken up Google and the security industry to its core.
The FBI today said it's made a long-awaited switch from its Automated Fingerprint Identification System (AFIS) to an upgraded, faster one the FBI calls Advanced Fingerprint Information Technology
While devices such as the iPhone, iPad, Blackberry and Android are in most cases welcomed into the corporate world, there's uncertainty about how to fit them.
What's "pervasive memory scraping" and why is it considered by SANS Institute security researchers to be among the most dangerous attack techniques likely to be used in coming the coming year?