Qualys unveiled a new tool at Black Hat this week, announcing availability of the beta version of its new Web Application Firewall (WAF).
Some D-Link devices that enable remote access to surveillance camera feeds or other potentially sensitive data contain critical vulnerabilities that enable hackers to bypass authentication and access them from the Internet.
As money and corporate information have morphed from hard currency and blueprints to digital files, small and midsized businesses have become the new banks to rob. In fact, bank robberies across the U.S. have plummeted from 9,400 in 1991 to just 3,870 last year. As Doug Johnson of the American Bankers Association puts it: "As more and more transactions become electronic, more bank crimes become electronic."
Asking customers or employees to pull out their phones and input a code every time they want to log onto your site is too much friction. Here's what else you can offer them while keeping your brand safe.
Blue Coat Systems, a provider of Web traffic filtering and business assurance products and services, plans to buy security analytics specialist Solera Networks, which uses data mining techniques to classify network traffic and detect potential security threats.
It's not enough to offer the latest wireless standard. Make sure the router that will support your office is up to snuff with these core features.
On Monday, the Department of Energy’s advanced research facility at the Los Alamos National Labs in New Mexico unveiled that it has had a functioning quantum Internet for more than two years—in a work-around sort of way.
In this Tech Tip video, we'll show you how to do more than just set a password to restrict access to your Wi-Fi network.
Security experts have defined the 20 most important security controls any organization should make now. Start with these four.
We benchmark five of the best 802.11n routers available today. Don't you dare upgrade your Wi-Fi without first reading our results.