Companies are grappling with the question of whether and how to let employees use their own smartphones and tablets at work.
Startup CrowdStrike made its debut this week, promising to have a security product out by the second quarter that will target the so-called advanced persistent threat (APT) problem in which stealthy intruders infiltrate networks to steal sensitive data for business or political reasons.
Every sport has its fans, and the Phoenix Suns basketball team is finding that use of social networking has become one of the main ways to keep in touch with its fan base -- though it can get dicey when basketball fans across the NBA go a little wild before big games.
Google, Microsoft, Facebook, LinkedIn and others are partnering with financial institutions as DMARC to educate customers about online scams.
It was another busy week for hactivists attacking the online targets of their ire.
Encryption keys on smartphones can be stolen using a technique involving radio waves, says one of the world's foremost crypto experts.
Though wariness about the perceived lack of security in cloud-based services is often voiced, there are some situations where the opposite is the case.
In acknowledging a data breach in which information related to as many as 24 million customers was stolen, online shoe and clothing retailer Zappos has taken assertive steps.
IT professionals offer advice on security, virtualization, and networking.
When HBGary Federal, had its website hacked and sensitive e-mail exposed by hacktivist group Anonymous last February, it became a question of how security firm HBGary could survive the damage to its reputation.
One of the main reasons for deploying desktop virtualization is the security advantages it can provide, such as keeping sensitive data off the endpoint, according to Citrix.
Sourcefire Monday said it expects to begin shipping its first two next-generation firewall appliances later this month, entering an increasingly crowded market.
The flap over the reported water utility hack in Illinois raises the question: Is the reporting system that the U.S. has set up to identify cyberattacks on critical infrastructure broken and in need of re-thinking?
Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.
TheInfoPro study finds Cisco and Juniper down, Check Point and Palo Alto up in a firewall popularity contest.