Virtualization is having an enormous impact, leading to questions about the role of physical security appliances in a virtual world.
UPDATE: Kaspersky Labs uncovers evidence that the development teams behind the Flame and Stuxnet cyberespionage threats collaborated.
Cyber criminals will generally go after the easiest targets. As long as you have better protection than the next guy you can avoid most attacks.
Analysis: "Strong" isn't a detailed password-rating; go for a quintillions possible combos, add a symbol.
Security companies have reported that the number of Last FM passwords stolen could be as high as 2.5 million.
The flaws were all over the map, and included memory corruption, integer and stack overflow, and security bypass bugs.
The cloud-based Targeted Attack Protection checks e-mail for phishing efforts and CloudPassage adds an authentication service for cloud apps.
Malicious computer code written by terrorists or nations threatens national security and stability, Homeland Security chief says -- to agreement by security experts.
From kludges to manual re-keying to redundant apps, these are the telltale indicators of an IT environment gone amok.
The company's fast, sweeping response proves how critical it considers Windows Update.