Insider threats changing security spending, report says

The 2015 Vormetric Insider Threat Report found that a large majority of U.S. companies believe they are vulnerable to insider threats.

New attack uses ransomware to drop trojans and keyloggers

The Internet Crime Compliant Center issued a warning on Thursday about a new scam that might be rooted in an initial ransomware infection.

Marriott fixes Android app issue that may have exposed personal data

The hotel chain has addressed a weakness in its Marriott International Android app that could have allowed attackers to access customer data, including credit card information.

2015 Predictions

Six ways identity will take center stage in 2015

Six ways identity will take center stage in 2015

With the growing connectedness of all things great and small, the need for trusted identities will take center stage in 2015.

Focus: Cyber Threats

Firm finds link between Regin spy tool and QWERTY keylogger

Source code for the keylogger, called QWERTY, was published in Snowden documents.

Industry Innovators

Perimeter defense

This is another market area that has seen a lot of change over the past few years.

Virtualization and cloud security

The year's Innovators in this group focus on security management in a cloud or virtual environment.

Data protection

Data protection is a fuzzy, sometimes nebulous term. Certainly everything we do on the network is intended to protect the data on it. In an era of widely dispersed global enterprise the data often seems to be alone on the internet.

Security infrastructure

Security infrastructure is another one of those ever-changing categories. What looked like infrastructure a few years ago is, for the most part, long gone.

2014 Hall of Fame

Hall of Famers are in their third consecutive year of appearing here and that sends the strong message that they are Innovators and they have staying power.

Sign up to our newsletters