Ellen MessmerSenior Editor, Network World, Network World

Ellen Messmer is a senior editor at Network World. She covers news and technology trends related to information security.

Cybersecurity Call From Energy Department Involves Power Companies

In exchange for information about sensitive information, such as identifying network vulnerabilities or attacks, the government will share this benchmarking data that's given to it anonymously with any other utility that participates in the information-sharing.

Cars.com Races to Make Sure Performance Keeps up With Growth

With business accelerating, it's about handling the bumps in the road.

Apple Security Guru Unveils iPad, iPhone Encryption

A presentation at the Black Hat security conference featured an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets.

Black Hat Panel: Which Do You Trust Less With Your Data, the U.S. Government or Google?

A panel of experts here at the Black Hat Conference ask: Which do you trust less with your data, the U.S. Government or Google?

Black Hat: RSA Service to Zap Apps Pretending to Be From Your Company

RSA Wednesday introduced a service at the Black Hat Conference to monitor far and wide for signs of phony corporate mobile apps, and to work with Google Play, Apple iTunes and other major app stores to remove them quickly.

Black Hat Demo: Google Play's Security Filter Can Let Bad Guys In

Google Play's security filter called Bounce can be circumvented allowing malicious Android apps to be listed in library.

Victim of Half-Million-Dollar Cybercrime Tells Tale of Fighting Back

Michelle Marsico's two-year ordeal ends with lawsuit settlement

BYOD Early Adopters Cite Sticker Shock

Companies are still only ramping up "bring your own device" policies that let employees use their own smartphones and tablets for business, but in many instances, they're finding BYOD is pricier than just issuing devices themselves.

A Look at the Worst Security Snafus of 2012 -- So Far

The year started off with the FBI raiding the cloud file-sharing and storage Megaupload site, and last month the University of Nebraska acknowledged a data breach that exposed personal information on students and employees, plus parents and university alumni.

Password Protection 101: Lessons From the eHarmony Data Breach

The passwords used by the eHarmony site visitors shows that names of sports teams, dogs, states and masculine and feminine names formed the foundation of many of the passwords.

Intel/McAfee: What's the Future of Security?

McAfee's co-President discusses the merger of chip manufacturing and security software.

Why Network Firewalls and Mainframes Are Still Security Favorites

Network firewalls and mainframes are old technology, but despite calls over the years to do away with one or the other, they remain in widespread use.

Trend Micro Rebuts Hacker Claims About Corporate Break-in

Security firm Trend Micro is rebutting claims by a hacker about breaking into the Trend Micro network and installing a backdoor to unauthorized information.

Study: 86% of Top Websites Expose Visitors to Third-party Tracking Cookies

How prevalent is the use of tracking cookies that get planted on your computer after browsing a website so it can keep track of what you're doing?

Does Two-factor Authentication Need to Be Fixed?

Tough criticisms heard this week from researchers about the effectiveness of two-factor authentication, especially as it's used in its token form for one-time passwords and smartcards, suggest advances need to be made to restore its luster as security protection.