The National Cyber Range will reportedly help military planners try out attack and defense scenarios.
A phony anti-virus scam is presenting itself as a near-perfect Microsoft update popup with one notable exception - it appears only on machines using Firefox.
Virtualization, mobility and social networking were flagged as posing most security risk to businesses, partly because there is no accepted set of best practices yet to protect them, IT Roadmap attendees were told.
Should cyber-strike provoke a physical response used in traditional warfare?
IPhones, iPads and other employee-owned mobile gear are the most risky devices that can be connected to corporate networks, according to a new survey by ISACA.
Public clouds have a way to go if they want to be the top choice of businesses looking to put resources in a shared, centralized computing environment.
The hacker attacks against the Sony network should prompt reexamination of security measures and response plans.
Businesses can now grant iPads safe remote access to files using new software designed to meet enterprise management and security concerns.
Sony's Playstation Network is entering its second month of being mostly unavailable, and the popular gaming site is still beset by troubles.
Throwing more technology at security threats as they crop up is not the best way to go if the goal is to protect the most valuable data.
Social networks such as Facebook and Twitter open threats to sensitive corporate data that businesses need to deal with aggressively.
Cloud services are not secure enough for businesses to use.
Businesses need to look at security as a military exercise and can benefit from strategies that have proved useful in battle, says a former military security expert.
The worldwide hacker group Anonymous may have played a role--even unwittingly--in the theft of personal data from the Sony PlayStation Network.