While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.
While passwords have got a lot of bad press recently thanks to some massive security breaches, the truth is that as an authentication system they can provide a very high level of security. Perhaps more … more »
Why is securing point-of-sale systems so hard, and what can retailers do to improve their PoS security postures?
While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.
A fork of TrueCrypt's code, VeraCrypt strengthens the open source encryption software's transformation process and addresses other weaknesses.
FireEye Turns Its Attention to SCADA industrial control systems.
Veracode CEO explains what his company is doing now as he heads toward a public offering.
An open source tool can mitigate risks associated with Bash shell attack.