Eleventh Circuit dismisses LabMD motion questioning FTC authority

LabMD can challenge the FTC's enforcement authority in federal court once the agency comes to a final decision on the exposure of patient data.

Changes made to regarding personal data sent to third parties

The Obama administration has scaled back the amount of personal information of users it sends to third parties.

CTB-Locker ransomware variant being distributed in spam campaign

As part of a recent spam campaign, Trend Micro researchers observed a variant of CTB-Locker ransomware asking for 3 Bitcoins within 96 hours.

2015 Predictions

Six ways identity will take center stage in 2015

Six ways identity will take center stage in 2015

With the growing connectedness of all things great and small, the need for trusted identities will take center stage in 2015.

Focus: Legislation

Proposed CFAA revisions agitate IT security community

The security community is voicing concern over proposed revisions to the Computer Fraud and Abuse Act (CFAA) by taking to Twitter and personal blogs.

Industry Innovators

Perimeter defense

This is another market area that has seen a lot of change over the past few years.

Virtualization and cloud security

The year's Innovators in this group focus on security management in a cloud or virtual environment.

Data protection

Data protection is a fuzzy, sometimes nebulous term. Certainly everything we do on the network is intended to protect the data on it. In an era of widely dispersed global enterprise the data often seems to be alone on the internet.

Security infrastructure

Security infrastructure is another one of those ever-changing categories. What looked like infrastructure a few years ago is, for the most part, long gone.

2014 Hall of Fame

Hall of Famers are in their third consecutive year of appearing here and that sends the strong message that they are Innovators and they have staying power.

Sign up to our newsletters