IBM is investing in outreach to universities in a bid to better educate future security professionals.
In the modern IT security landscape, universities are a key battle ground for both attackers and defenders. In recent years, attacks against university IT infrastructure have grown and so too has the need … more »
Microsoft and VMware both have extensible network virtualization offerings that make it possible for third-party vendors to integrate their security tools.
Sixty-four percent of companies surveyed by the Ponemon Institute do not believe they have enough budget to adequately secure mobile devices.
Shellshock and the Xen vulnerability. One of these things is not like the other, and an expert says they can teach us a lot about how to disclose security vulnerabilities.
While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.
Why is securing point-of-sale systems so hard, and what can retailers do to improve their PoS security postures?
A fork of TrueCrypt's code, VeraCrypt strengthens the open source encryption software's transformation process and addresses other weaknesses.