Computer viruses and super-villains have more in common than you thought. An analogy between the two seemingly-disconnected entities proves why.
Top hats in the cyber security space have identified ransomware as the biggest threat we face today. Here’s all you need to know about the ransomware riffraff.
Its chief feature is liability protection for information sharing
Simply put, deception technology uses decoys to misdirect the attacker and prevent him/her from going deeper into the network and reaching the intended target. A conversation with Rajpreet Kaur, senior research analyst, Gartner reveals how ‘honey-trapping’ hackers could give you a leg up.
Network World chats with John Hurley, CEO of SmartFile, about how enterprise IT departments can embrace "rogue users" and "Shadow IT" instead of shutting them down.
In this roundup of tech news for the week 28 - 31 October, 2013 we talk about Infosys, Dell, cyber crime and enterprise cloud.
Microsoft says "sorry" for the estimated 15-hour outage.
Inherent insecurity in the routing protocol that links networks on the Internet poses a direct threat to the infrastructure that secures communications between users and websites.
Go ahead and update Java -- or disable it if you don't remember the last time you actually used it on the Web: Oracle's latest patch, released Tuesday, fixes 25 vulnerabilities in the aging platform, including one that's already being exploited in attacks.
In a recent presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy, Michael Bruemmer of Experian Data Breach Resolution outlined some the common mistakes his firm has seen as organizations deal with the aftermath of a breach.