Expected device loss at 2012 Summer Games expected to amount to 214.4 terabytes of data.
Dell SecureWorks researcher Brett Stone-Gross deconstructs dangerous money stealer.
It remains to be seen whether this move by Google will clean up the discourse in the comments section.
New tool can test if Web application firewalls are vulnerable to protocol-level evasion techniques.
Dell SecureWorks report on advanced persistent threats warns against security companies conducting cyber-espionage
Gives developers guidance for avoiding the App Store hack.
New detection technnology accounts in part for the rise which still shows how cybercriminals are still hard at work.
Mantraps, access control systems, bollards and surveillance. Your guide to securing the data center against physical threats and intrusions.
Andrew Jaquith says information security metrics don't have to rely on heavy-duty math to be effective, but they also don't have to be dumbed down to red, yellow, green. Here are five smart measurements--and effective ways to present them.
Seventy-five percent of HTTPS websites from Alexa's top one million are vulnerable to the BEAST SSL attack
U.S. spent close to $11-plus billion to protect classified data in 2011; versus $5 billion in 2001.
Android security unaffected by Adobe dropping Flash.
Deal with these three main security concerns to improve your virtualized IT environment, says Bernard Golden.
The only way to restore the balance between our acquaintances and trusted connections is to outsource how we trust.
IT security threats are constantly evolving. It's time for IT security pros to get ingenious.
As the Mac starts to make inroads back into the enterprise, Apple faces a major problem -- one that roars like a Lion. Its current operating system is a disaster from an IT management perspective.
According to a 2011 study by the Ponemon Institute, the cost of cybercrime in the US could range from $1.5 million to $36.5 million annually.
While you were upgrading your servers with the latest intrusion detection, did someone just walk in and steal them? We urge you not to forget the obvious when you're doing your security planning.
John Kendall of Unisys gives us a view on how biometric technologies are gearing up to be an integral part of the enterprise security strategy.
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory.
The complex and ever-changing security landscape can befuddle small businesses, and the plain truth is that there is no silver security bullet. Small businesses would be well-advised to deploy a multi-faceted security strategy. Here are eight must-have checklist items.
When it comes to security in the cloud, organizations are confident in their cloud providers, but also and reluctant to expose certain types of data and applications, according to IT industry association CompTIA. Security vendors maintain the problem is one of visibility and control, and each has a solution.
Key security issues can vary depending on the cloud model you're using. Vordel CTO Mark O'Neill looks at 5 critical challenges.
The Cloud Security Alliance and others are working to define security requirements for SaaS, IaaS, and PaaS cloud computing models.
Analyst says the future lies in a hybrid physical/virtual security technology.
Joe Sullivan, CSO of Facebook, talks about spam, fake accounts, cooperating with Google and Twitter, and much more
Executive Chairman of RSA, EMC's Security Division, Art Coviello talks about the potential of cloud computing and how security needs to adapt to the BYOD concept.