Network Virtualization Yields New Approaches to Security

Microsoft and VMware both have extensible network virtualization offerings that make it possible for third-party vendors to integrate their security tools.

If you think the virtualization phenomenon has seen its peak, you probably haven't looked at the market very closely. If anything, the move to virtualize more applications and services has picked up momentum … more »

Mobile Security's Budget Shortfall

Sixty-four percent of companies surveyed by the Ponemon Institute do not believe they have enough budget to adequately secure mobile devices.

Shellshock a Fail for Security Disclosure

Shellshock and the Xen vulnerability. One of these things is not like the other, and an expert says they can teach us a lot about how to disclose security vulnerabilities.

Passwords Not Going Away Any Time Soon

While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.

No Easy Fix for Point-of-Sale Security

Why is securing point-of-sale systems so hard, and what can retailers do to improve their PoS security postures?

Mobile Device Management Not Just for Big Companies

While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.

VeraCrypt a Worthy TrueCrypt Alternative

A fork of TrueCrypt's code, VeraCrypt strengthens the open source encryption software's transformation process and addresses other weaknesses.