Are you doing enough to secure your organization's sensitive information?
The Cyber Security Act of 2012 may be a start, but Congress has a history of missing the mark when it comes to information security legislation.
Targeting your users for phishing attacks is a great way to ensure social engineering training sticks.
A stolen password was used to access the employee's account, which contained a document with user e-mail addresses, Dropbox said.
The infamous security convention has wound up, leaving hackers of all hat colors bemused, befuddled, and bewildered.
New Rakshasa hardware backdoor is demonstrated at Defcon security event; it is persistent and hard to detect, researcher says.
Security researchers released two tools at the Defcon security conference that can beat the encryption of certain PPTP sessions in less than a day's work.
Hotel locks, iris scans, GooglePlay and other "secure" technologies are cracked in demonstrations at the security conference.
We need stronger security for mobile devices as we begin to make payments by smartphone, or connect on the go to the company network.
Black Hat security conference: University of Washington creation gives you vicarious thrills of social engineering, lock picking.