Sixty-four percent of companies surveyed by the Ponemon Institute do not believe they have enough budget to adequately secure mobile devices.
Recent research from Gartner shows worldwide spending on information security growing nearly 8 percent this year, reaching $71.1 billion by the end of 2014. That figure translates to an average of $381 … more »
Shellshock and the Xen vulnerability. One of these things is not like the other, and an expert says they can teach us a lot about how to disclose security vulnerabilities.
While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.
Why is securing point-of-sale systems so hard, and what can retailers do to improve their PoS security postures?
While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.
A fork of TrueCrypt's code, VeraCrypt strengthens the open source encryption software's transformation process and addresses other weaknesses.
FireEye Turns Its Attention to SCADA industrial control systems.