In the wake of a threat by Anonymous to expose Symantec source code, the company advises customers to stop using pcAnywhere -- but says its antivirus software products are not at risk.
As the average cost of recovering from cyber attacks approaches half a million dollars per year, Symantec says it's time to beef up your defenses.
The new services offering is intended to help organizations assess and mitigate the risk associated with deployment and use of mobile devices.
Centrify Express 2012 seeks to ease the pain of IT professionals tasked with integrating Unix, Linux and Mac with Active Directory.
Seeking to help organizations control the lifecycle of their sensitive data, RSA introduces enhancements to DLP Suite 9.0 that helps them address smartphones, tablets and social media.
Venafi says more than half of enterprises can't account for digital certificates on their networks or encryption keys. The answer, it says, is automating management of these assets.
According to Cisco's Annual Security Report, cashing out their ill-gotten gains has become cybercriminals' biggest bottleneck.
Botnets have become the online center of highly profitable criminal enterprises, but how do they actually rake in the cash?
The IT security firm debuts Retina CS 2.0 Management Console to provide its customers with end-to-end vulnerability and compliance management.
If you work in information security, the latest WikiLeaks controversy should have you considering how your company deals with securing its data.
Cybercriminals seized on Facebook users' woes earlier this week to spread a malicious downloader Trojan the old-fashioned way--by e-mail.
Information security functions are trying to adapt to the new world of mobile computing, cloud computing and social networking, but at the end of the day, it's really about data loss prevention.
No matter how tight your network security or well-considered your security policy, the human element at your business remains vulnerable to hackers. But there are steps you can take to tighten your security against social engineering attacks.
The network security provider introduces virtual versions of its FortiGate, FortiManager, FortiAnalyzer and FortiMail appliances, promising better visibility and security within cloud environments.
The latest version of Paessler's network monitoring suite features fail-over clustering and Linux support, as well as a simplified licensing structure.
Aiming to extend its offerings from the PC to the mobile sphere, Symantec has announced a new mobile security and management strategy that encompasses solutions for enterprises, consumers and communication service providers.
Nominum, a provider of intelligent DNS solutions, has created a real-time feed of bot-related malicious domains that network owners can leverage to block the propagation of botnets and other malware.
Data loss events are continuing at a "fairly alarming rate" according to Keith Crosley of cloud-focused security firm Proofpoint, which recently released its seventh annual study of data loss in the enterprise.
While financial services firms across the world continue to make budget cuts, Deloitte says the knife has passed over many information security budgets, and those firms are turning their attention to Identity and Access Management (IAM).
PacketSentry 4.0, the latest version of PacketMotion's flagship product, delivers PCI segmentation capabilities with an agentless, non-line platform.
DefCon contest proves your company's greatest security weakness is likely loose-lipped employees who can be scammed into revealing sensitive data more easily than you might think.
The network security provider delivers new levels of performance in an entry-level appliance aimed at distributed enterprises, SOHOs and small businesses, and service providers delivering managed services in CPE deployments.
San Antonio-based GlobalSCAPE has partnered with Rackspace Hosting to provide its Enhanced File Transfer Server as a subscription.
A cloud-based authentication specialist wants to make financial transactions more secure through the use of one-time password technology on mobile devices.
New inline threat-prevention appliance incorporates integrated Malware-VM and Malware-Callback filters to inoculate networks.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?