Despite the risks of not making security policies central to enterprise BYOD and mobility programs, many organizations are ignoring this best practice.
With any new technology, enterprise IT organizations tend to deploy first, introduce policies later. This policy-as-an-afterthought approach is always problematic, but the potential for trouble is especially … more »
Hackers like the Syrian Electronic Army are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.
Video: Ben Golub, CEO of Docker, explains how Linux container technology presents a very different model for virtual security.
Akamai is paying $370 million to add a missing piece to its security portfolio, enabling full Web application and data center Distributed Denial of Service protection.
Biometrics promised to bring security to everything from transactions to systems usage. Yet biometrics never saw broad adoption. Can biometrics finally go mainstream?
The researcher once known as Rain Forrest Puppy explains how he discovered the first SQL injection more than 15 years ago.
New research considers security implications of mobile point-of-sale applications on Apple's iPhones and iPads.
As an annual contest shows, social engineering can be an effective way for hackers to obtain sensitive data. Training is one of the best ways to fight social engineering.