Security shortcomings of third-party vendors are a cybercriminal's dream. So security pros should revisit how they manage vendor relationships.
Credit card data of 40 million Target customers, 15,000 Boston Medical Center patients’ personal information, and payment card information of 868,000 Goodwill customers – all of this information … more »
Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.
Web application firewalls, an especially critical component of enterprise security, are even more effective when combined with other emerging security technologies.
Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.
Avast debuts free Business Anti-Virus, but what's the catch?
FireEye's Kevin Mandia has a few key questions for CISOs.
With Heartbleed and Shellshock, the open source community realized that Linus' law can be challenged.