Harris Interactive survey also indicates a gender gap when it comes to confidence in mobile security.
The network security firm makes what it says is the biggest release since the company was formed.
Security experts debate whether we're already in a cyberwar, the role of government and potential solutions.
Survey released on Data Privacy Day indicates Americans are more concerned about online privacy violations losing their jobs. So why don't they do anything about it?
U.S. Commerce Secretary Gary Locke announces a National Program Office focused on steps to ensure trusted online transactions. Can it work?
Google Apps users now have the option of adding email authentication to validate email and head off spam messages.
The Security-as-a-Service provider expands Dell's IT portfolio with a number of security, threat management and compliance services.
Survey says most Americans are willing to give the President the ability to cut off Internet access for national security reasons. The Unisys-sponsored survey also details holes in most consumer's security practices.
Free two-factor authentication feature is designed to add an extra layer of protection to Google's cloud applications.
New survey says spam is becoming harder for U.S. adults to distinguish from legitimate email.
More than five billion smart cards shipped in 2009, but a new report says the market is poised for further growth.
The Quarterly Global Threat Report offers insight into the types of attacks happening on enterprise networks. Adobe Reader/Acrobat, Sun Java, and Adobe Flash were the three most common malware targets over the first half of 2010.
The new Tripwire Enterprise 8.0 release is designed to automate the process of bringing IT systems into both regulatory compliance and a company's internal mandates.
The database giant says the new release of Oracle Identity Management 11g "radically simplifies" application security.
Fans of the 'Twilight' vampire saga could be in for a nasty surprise while searching the Web for movie information.
A survey of IT professionals finds the growing use of iPhones and other personal mobile devices on corporate networks poses a security problem.
HP will be providing infrastructure and applications integration for a Cyber Control System designed to provide strategic information and identify cyber threats for the USAF.
New security white paper details Google's security practices for its cloud-based apps.
According to a report in the Financial Times, Google began moving employees to other operating systems after its systems were hacked.
As enterprises see rising use of Facebook, Twitter and other social networks, security and privacy safeguards remain an important concern.
AlwaysOn OnDemand panel participants ask, "Are private and semi-private clouds the only safe bets for the enterprise?"
Prompted by claims of hacking and a policy of censorship, the search giant's battle with the Chinese government may be headed for closure.
Presenting potential risks to businesses and a new realm of privacy challenges to individual users, Twitter takes its geotagging feature live.
Symantec this week demonstrated a new Object File Server technology designed to help deal with secure data management and storage issues.
Security software firm shows prototype system designed to help carriers weed out bad apps, as well as security risks.
- Mar 2011
- Feb 2011
- Jan 2011
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Jul 2009
- Apr 2009
- Feb 2009
- Aug 2008
- Jul 2008
- Feb 2008
- Jan 2008
- Nov 2007
- Oct 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Sep 2006
- Aug 2006
- Apr 2006
- Mar 2006
- Jan 2006
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?