Sony hackers lingered in network before unleashing malware

According to reports, hackers were in the Sony Pictures network for months gathering passwords and the like before launching their attacks.

American in Uganda charged in counterfeiting scheme

After a Secret Service-led investigation, Ugandan authorities arrested a 27-year-old American man for counterfeiting and conspiracy.

North Korea's internet access unstable

Access to the internet within North Korea has been undependable in the past 24 hours.

2015 Predictions

Six cloud security predictions for 2015

Six cloud security predictions for 2015

A year of continuousl breach and surveillance headlines shook both enterprise and consumer confidences and is driving more urgent security discussions.

Focus: Cyber Threats

Neverquest botnet furthers crimeware-as-a-service biz for fraudsters

Neverquest, also known as Vawtrak, is data stealing malware that targets banking information.

Industry Innovators

Perimeter defense

This is another market area that has seen a lot of change over the past few years.

Virtualization and cloud security

The year's Innovators in this group focus on security management in a cloud or virtual environment.

Data protection

Data protection is a fuzzy, sometimes nebulous term. Certainly everything we do on the network is intended to protect the data on it. In an era of widely dispersed global enterprise the data often seems to be alone on the internet.

Security infrastructure

Security infrastructure is another one of those ever-changing categories. What looked like infrastructure a few years ago is, for the most part, long gone.

2014 Hall of Fame

Hall of Famers are in their third consecutive year of appearing here and that sends the strong message that they are Innovators and they have staying power.


The problem with Big Data

The problem with Big Data

Big Data just keeps on getting bigger and bigger. It's almost like Moore's Law. has a domino effect.

Sign up to our newsletters