TrueCrypt Getting a New Life

TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.

When the developers of TrueCrypt delivered the bombshell that they were abandoning their popular open source encryption program, it left many organizations in a hugely difficult position. Should they continue … more »

Startup Spotlight: Threat Detection Specialist ThetaRay

Israeli security startup ThetaRay promises to detect zero-day attacks, hidden APTs and other threats in seconds by simultaneously analyzing all security and operational data sources.

9 Resources to Stay Current on Security Threats

These nine online resources will keep security pros informed about the latest threats.

IBM Brings Bare Metal Intel TXT Security to Cloud

The cloud isn't just about virtual servers. The physical layer and its security still matter, which is why IBM is using Intel's Trusted Execution Technology.

For Bank, Mobile Device Management Offers Benefits – Some Unexpected

Massachusetts' Needham Bank enjoys a bevy of benefits thanks to its mobile device management system.

How to Build Security into Your Software Development Lifecycle

Employing the right methodology and tools are two keys to effective application security testing.

Internet of Things a Potential Security Disaster

Experts believe the Internet of Things will be highly insecure, at least in the early days.