No Easy Fix for Point-of-Sale Security

Why is securing point-of-sale systems so hard, and what can retailers do to improve their PoS security postures?

Shoppers are surely getting nervous after a flood of credit card breaches at major retailers from Target to Home Depot that revealed vulnerabilities  in point-of-sale (PoS) systems. Last month the … more »

Mobile Device Management Not Just for Big Companies

While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.

VeraCrypt a Worthy TrueCrypt Alternative

A fork of TrueCrypt's code, VeraCrypt strengthens the open source encryption software's transformation process and addresses other weaknesses.

Keeping SCADA Systems Secure

FireEye Turns Its Attention to SCADA industrial control systems.

Veracode Gears up for Security IPO

Veracode CEO explains what his company is doing now as he heads toward a public offering.

Enforcing Password Complexity without Alienating Users

Protecting passwords from compromise is a challenge for IT managers, who must deal with attacks that aim to compromise systems while giving users the simplicity they want.

An Open Source Solution to Shellshock

An open source tool can mitigate risks associated with Bash shell attack.