The Syrian Electronic Army, a pro-Assad hacking group, altered the DNS records used by the New York Times, Twitter, and the Huffington Post. Here are three ways such attacks happen, and how they can be mitigated.
When it comes to building secure mobile applications, errors most often occur in session management. By themselves, these mistakes do not present a significant risk, but the more mistakes made, the more vulnerable the application. And therein lies the problem: I often find several of these errors in any given app.
Raju Vegesna, chief evangelist for Zoho, speaks about the SaaS market in India, the factors contributing to the increase in SaaS adoption, and how mobility and BYOD are changing the game.
The only way to restore the balance between our acquaintances and trusted connections is to outsource how we trust.
IT security threats are constantly evolving. It's time for IT security pros to get ingenious.
John Kendall of Unisys gives us a view on how biometric technologies are gearing up to be an integral part of the enterprise security strategy.
The complex and ever-changing security landscape can befuddle small businesses, and the plain truth is that there is no silver security bullet. Small businesses would be well-advised to deploy a multi-faceted security strategy. Here are eight must-have checklist items.
Executive Chairman of RSA, EMC's Security Division, Art Coviello talks about the potential of cloud computing and how security needs to adapt to the BYOD concept.
Amazon, Box.com and Terremark each submit information to join the Cloud Security Alliance's STAR program.