Unlocking Smartphones: PINs, Patterns or Fingerprints?

PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?

Losing your smartphone can result in a catastrophic security breach. After all, these devices are potential treasure troves of confidential corporate and personal information waiting to be exploited by … more »

Health Care Industry Susceptible to Cyber Attacks

Health care experiences 340 percent more security incidents and attacks than most other industries, finds Raytheon/Websense research.

Europe's Data Protection Regs: What You Need to Know

Europe's data protection rules are about to get more strict, under legislation being drafted by the European Commission. Several rules relate to cloud data.

Immunio Embeds Security Directly into Applications

Instead of bolting on security, Canadian startup takes an innovative approach that embeds security directly into apps.

Apple Watch Security Risks (and Benefits)

With the Apple Watch, as with smartphones before it, security pros need to proactively prepare for the mobile device's entry into the workplace.

Niara Pushes Security Analytics Vision Forward [VIDEO]

After emerging from stealth mode, startup is finding some interesting results in the field.

Who Is Hacking Who – and Why You Need to Know

Will knowing who is attacking them help enterprise security pros mount a better defense?