EMC expands its RSA portfolio to meet the security challenges posed by the growing popularity of mobile devices, Web applications and cloud infrastructures.
Data security software maker McAfee seeks to make administrators' lives easier by integrating its ePolicy Orchestrator product.
Intel’s data security division drops $389 million to expand into the enterprise network protection market.
Betting on security and privacy, Microsoft hopes to avoid the issues that tripped up Google's cloud deal for Los Angeles.
The House of Representatives passes the controversial cybersecurity legislation, but opponents vow to stop it in the name of online privacy.
Virtualization software maker targets the bring-your-own-device crowd with free data security apps for the popular cloud storage service.
With Microsoft's help, Panda is leveraging Azure's massive data centers to scale its Cloud Office Protection service globally.
A one-stop guide to understanding the infamous IE7 vulnerability and patching it effectively (the sooner, the better).
It has been a spooky month, both in and out of IT security. Here are some tips your users can take with them and use every month of the year.
In a new report, the security firm finds that the Storm botnet is still alive and kicking.
In an effort to fend off rivals, Storm baits would-be victims with sexy e-mails.
Nasty malware in its own right, Storm also provided a cunning spam platform, and perhaps more troubling, a template for others to follow.
Microsoft buys Winternals, EMC and RSA get cozy and disaster recovery takes center stage.
Security appliance maker combats online and network threats with two new appliances designed to deliver snappy performance
Facing the prospect of unemployment, your most trusted employee can suddenly turn into your network's worst enemy. The Secret Service releases a paper with eye-opening reports on the lengths ex-workers will go to exact revenge.
However unlikely the pairing of printing and biometrics technology may seem, one company combines the two so that businesses won't have to learn a lesson in just how deep paper cuts.
The network equipment maker turns its attention to security with new management software.
Sun and its partners introduce a line of security appliances to tackle spam, viruses and hackers.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?