Head of National Cybersecurity Protection System explains where DHS is making investments to defend the U.S federal government's network.
The U.S Department of Homeland Security (DHS) is responsible for ensuring the security of the nation, but who is responsible for helping to ensure the security of the DHS network?
Part of that responsibility … more »
What has changed in the year since Kevin Mandia first exposed hacking by the Chinese Army?
Here are three do's and two don'ts for responding to a data breach.
Privacy officers from Google, Microsoft and Intel Secret discuss privacy in the modern world at this week's RSA conference.
Addressing RSA attendees, IDC analysts detail outlook for the current and future IT security landscape.
VMware aims to position the hypervisor as the 'just right' place to do security.
Modern Web and mobile apps tend to use external resources, often called via an API, making the API a critical control point for security. That is why CA is addressing API security with new products.
Even security-conscious enterprises like Yahoo can be compromised by attacks in which ad servers are used to deliver malware. How can you fight this 'malvertising' threat?