Ponemon Institute and Compuware study finds porous data protection policies and technologies are putting millions of customers—and their assets—at risk.
White House cyber coordinator Howard Schmidt makes news at the RSA show, announcing the declassification of the cybersecurity plan developed two years ago.
New research from the Ponemon Institute and Compuware details sloppy data practices that pervade the financial services sector and outlines the potential consequences of a breach.
Microsoft proposes throwing malware-infected PCs into quarantine and denying them Internet access. The company also announces availability for its new identity management product.
Information is gold and cyber villains are getting more aggressive in their attempts to steal it. Data theft requires new ways of thinking, says Symantec CEO Enrique Salem at RSA.
At annual RSA security show, Big Blue unveils enterprise IT security suite that includes products to secure operations from application code all the way through deployment.
"Patch Tuesday" is looking like an easy time for systems administrators and PC support engineers when Microsoft releases its latest batch of bug fixes to the world next week.
Patch meant to kill off 17-year-old bug was suspected of causing multiple crashes and continuous reboots, but the problems were traced to a rootkit. But since the patch won't install on infected systems, what will users do now?
Previously known as Windows Genuine Advantage, Windows Activation Technologies' update adds detection of 70 activation hacks for Windows 7, aims to cut down on piracy and counterfeiting.
Windows 7 represents an advance in Microsoft security, while Snow Leopard enjoys Apple’s traditional security advantage. A security expert compares the operating systems' security on a feature by feature basis.
Alternative providers like OpenDNS and Google's Public DNS may provide better browsing performance and better security, and can help protect you from known phishing and malware-infected domains.
With enterprise cloud applications now residing on the mobile phones of many employees, the security challenges are raised exponentially. How can your company stay safe?