WikiLeaks requests information on staffers search warrant data requests

WikiLeaks penned a letter to Google CEO Eric Schmidt requesting more information about search warrants under which the company handed over WikiLeaks staffers' data.

Spoof page credits 'Official Cyber Caliphate' with Malaysia Airlines hack

Visitors to the Malaysia Airlines website were redirected to a spoof page displaying a lizard wearing a tux, monocle and top hat.

Report: Most U.S. weapons programs contain 'significant vulnerabilities'

The head weapons tester at the Pentagon has released a report that indicates a slew of vulnerabilities affecting Department of Defense networks.

2015 Predictions

Six ways identity will take center stage in 2015

Six ways identity will take center stage in 2015

With the growing connectedness of all things great and small, the need for trusted identities will take center stage in 2015.

Focus: Mobile Security

'Sexy Girls' wallpaper app in Google Play store accessed account info

The app is no longer available from the Google Play store, but prior to being removed it had been installed between 50,000 and 100,000 times.

Industry Innovators

Perimeter defense

This is another market area that has seen a lot of change over the past few years.

Virtualization and cloud security

The year's Innovators in this group focus on security management in a cloud or virtual environment.

Data protection

Data protection is a fuzzy, sometimes nebulous term. Certainly everything we do on the network is intended to protect the data on it. In an era of widely dispersed global enterprise the data often seems to be alone on the internet.

Security infrastructure

Security infrastructure is another one of those ever-changing categories. What looked like infrastructure a few years ago is, for the most part, long gone.

2014 Hall of Fame

Hall of Famers are in their third consecutive year of appearing here and that sends the strong message that they are Innovators and they have staying power.


Could the Sony breach have been prevented?

Could the Sony breach have been prevented?

While most agree that corporate security needs to improve, a question still remains: Even with best practices in place, could the Sony debacle have been prevented?

Sign up to our newsletters