When HBGary Federal, had its website hacked and sensitive e-mail exposed by hacktivist group Anonymous last February, it became a question of how security firm HBGary could survive the damage to its reputation.
One of the main reasons for deploying desktop virtualization is the security advantages it can provide, such as keeping sensitive data off the endpoint, according to Citrix.
Sourcefire Monday said it expects to begin shipping its first two next-generation firewall appliances later this month, entering an increasingly crowded market.
The flap over the reported water utility hack in Illinois raises the question: Is the reporting system that the U.S. has set up to identify cyberattacks on critical infrastructure broken and in need of re-thinking?
Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.
TheInfoPro study finds Cisco and Juniper down, Check Point and Palo Alto up in a firewall popularity contest.
Increased use of mobile devices, especially smartphones, in addition to the transition to virtualization, are key factors weighing on companies.
A survey by Symantec shows that small to midsized (SMB) managers think they are not targets for attack.
CA Technologies has gotten its feet wet with cloud-based security before, but now the company is moving further in with a package of cloud based identity and access control services.
Software engineer Hanjuan Jin, accused of stealing thousands of confidential and proprietary technical documents from Motorola to share with competitors and the People's Republic of China, is expected to stand trial this week in Chicago.
The 'bring your own device' phenomenon is growing but many obstacles remain.
Cisco has announced a hardware encryption module for its ISR G2 router that allows point-to-point encryption of IP traffic.
Articles by Ellen Messmer