No Silver Bullet for Use-After-Free Flaws [VIDEO]

There is no shortage of threats on the modern Internet and no shortage of vendors aiming to provide security solutions. One vendor, Bromium, employs a virtualization micro-visor to provide isolation and … more »

TrueCrypt Getting a New Life

TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.

Startup Spotlight: Threat Detection Specialist ThetaRay

Israeli security startup ThetaRay promises to detect zero-day attacks, hidden APTs and other threats in seconds by simultaneously analyzing all security and operational data sources.

9 Resources to Stay Current on Security Threats

These nine online resources will keep security pros informed about the latest threats.

IBM Brings Bare Metal Intel TXT Security to Cloud

The cloud isn't just about virtual servers. The physical layer and its security still matter, which is why IBM is using Intel's Trusted Execution Technology.

For Bank, Mobile Device Management Offers Benefits – Some Unexpected

Massachusetts' Needham Bank enjoys a bevy of benefits thanks to its mobile device management system.

Internet of Things a Potential Security Disaster

Experts believe the Internet of Things will be highly insecure, at least in the early days.