Researchers reveal how they can leverage free cloud services as an efficient attack platform without spending any money.
The cloud is being used by organizations of all sizes as a way to lower costs and achieve a better return on investment. But it can also be leveraged by more malicious actors as a highly efficient platform … more »
Head of National Cybersecurity Protection System explains where DHS is making investments to defend the U.S federal government's network.
What has changed in the year since Kevin Mandia first exposed hacking by the Chinese Army?
Here are three do's and two don'ts for responding to a data breach.
Privacy officers from Google, Microsoft and Intel Secret discuss privacy in the modern world at this week's RSA conference.
Addressing RSA attendees, IDC analysts detail outlook for the current and future IT security landscape.
VMware aims to position the hypervisor as the 'just right' place to do security.
Modern Web and mobile apps tend to use external resources, often called via an API, making the API a critical control point for security. That is why CA is addressing API security with new products.