Tough criticisms heard this week from researchers about the effectiveness of two-factor authentication, especially as it's used in its token form for one-time passwords and smartcards, suggest advances need to be made to restore its luster as security protection.
From network services and storage to virtualization and private cloud, Microsoft's beefy new server OS leaves no server role unturned.
Large organizations with ample resources quake in their boots over two common security threats. Here's your best defense.
Majority of enterprise networks have outdated, misconfigured, insecure devices not up to the task of supporting BYOD and virtualization, a new study finds.
Detection is key, but how you respond to APTs is equally important
Fox Entertainment Group, the Arizona State Police and Britain's Serious Organized Crime Agency were also targeted by the attacks.
It was learned that the malware was stealing files and mailing them off to what appeared to be a service provider in China.
A technology will secure computers not by blocking them off from suspect data and applications but by isolating anything untrusted from the core of the OS.
WikiLeaks founder Julian Assange has requested political asylum from the government of Ecuador, and is under the protection of the country's embassy in London...
Security is inconvenient by nature. The trick is finding a balance that provides adequate security with an acceptable level of convenience at the same time.