To fight malware, security teams must understand it. Here are five especially nasty forms of malware.
By Nazar Tymoshyk, SoftServe
Today attackers are not being held back by anything, and malicious software is still a surprisingly common issue around the world. No wonder that more and more IT and business … more »
IBM has patented an invention that will help global businesses navigate complex regulatory landscape for cloud data.
Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.
Microsoft buys Aorato, the company that earlier this year disclosed a critical vulnerability in Microsoft's security.
While most cloud security startups focus on securing cloud infrastructure, Bitglass protects data traveling between corporate networks and SaaS applications.
As the Internet of Things proliferates, so too do IoT-based vulnerabilities and attacks. These three tips will help secure your IoT-enabled network.
The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.