In exchange for information about sensitive information, such as identifying network vulnerabilities or attacks, the government will share this benchmarking data that's given to it anonymously with any other utility that participates in the information-sharing.
With business accelerating, it's about handling the bumps in the road.
A presentation at the Black Hat security conference featured an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets.
A panel of experts here at the Black Hat Conference ask: Which do you trust less with your data, the U.S. Government or Google?
RSA Wednesday introduced a service at the Black Hat Conference to monitor far and wide for signs of phony corporate mobile apps, and to work with Google Play, Apple iTunes and other major app stores to remove them quickly.
Google Play's security filter called Bounce can be circumvented allowing malicious Android apps to be listed in library.
Michelle Marsico's two-year ordeal ends with lawsuit settlement
Companies are still only ramping up "bring your own device" policies that let employees use their own smartphones and tablets for business, but in many instances, they're finding BYOD is pricier than just issuing devices themselves.
The year started off with the FBI raiding the cloud file-sharing and storage Megaupload site, and last month the University of Nebraska acknowledged a data breach that exposed personal information on students and employees, plus parents and university alumni.
The passwords used by the eHarmony site visitors shows that names of sports teams, dogs, states and masculine and feminine names formed the foundation of many of the passwords.
McAfee's co-President discusses the merger of chip manufacturing and security software.
Network firewalls and mainframes are old technology, but despite calls over the years to do away with one or the other, they remain in widespread use.
Security firm Trend Micro is rebutting claims by a hacker about breaking into the Trend Micro network and installing a backdoor to unauthorized information.
How prevalent is the use of tracking cookies that get planted on your computer after browsing a website so it can keep track of what you're doing?
Tough criticisms heard this week from researchers about the effectiveness of two-factor authentication, especially as it's used in its token form for one-time passwords and smartcards, suggest advances need to be made to restore its luster as security protection.