Cisco has unveiled a self-described "complicated" security architecture dubbed SecureX that it says provides a context-aware way to safeguard networks increasingly overrun with smartphones, tablets and virtualization.
Lenovo announced at the RSA Conference Monday that its ThinkPad laptops and ThinkCentre desktops now support anti-theft and encryption capabilities aimed at minimizing the chance of data falling into the wrong hands when computers are lost or stolen.
Looking to help customers strengthen data security, Intel said it will include stronger one-time password authentication in its upcoming 2nd Generation Intel...
Can cloud-based computing be made more secure in the future using what crypto geeks call "fully homomorphic encryption" to send data as "encrypted blobs."
The annual RSA Conference, now in its 20th year, will be rocking this month as the security industry gathers in the weeklong extravaganza of product introductions and security experts arguing cloud and mobile computing security issues.
Security geeks at the Black Hat conference try every stunt possible to show what a clueless world we live in when it comes to security.
Should revenge assaults be just another security tool large IT shops use to counter cyber attacks?
When a researcher at an ethical-hacking firm discovered mobile devices from Apple, Google, RIM and HTC had a flaw in them, the respective companies reacted differently--RIM and Apple worked on patching, while Google and HTC reportedly shrugged it off.
Activity by the notorious Rustock has suddenly and inexplicably dropped, Symantec reports.
There's some early optimism about the information technology industry as the world steps into 2011. For one thing, the global network security market is expected...
Google, Cisco, McAfee, and the U.S. government all grab negative security headlines for the year's dubious honors.
Dell Wednesday announced its first endpoint encryption product, along with the possibility of factory installation on certain Dell PCs.
FTC preparing to issue a "privacy framework" that will include guidance about best practices.
The Google Chrome browser has earned the dubious distinction of being named the most vulnerable application on the "Dirty Dozen" list of 12 applications with the...