Security giant Symantec on Tuesday acquired Nukona, a privately held provider of mobile application management solutions, for an undisclosed amount.
DLP solutions remain fairly immature, but the need to protect and monitor sensitive information is greater than ever.
Developers can now turn to third-party platforms to meet their credential management needs, says Michael Ginsberg, CEO, Echoworx.
Organizations should consider risk when fixing vulnerabilities, especially considering most bugs are present in third-party applications.
A computer disk containing the personal information of thousands of medical aid applications has gone missing from the Colorado Department of Health Care Policy and Financing.
The personal information of thousands of current and former California state employees was improperly copied to a hard drive and removed from state offices.
The sky is not really falling. Instead, there are solutions to the dilemmas we face, even as progress makes surety ever more challenging.
Microsoft on Monday released an emergency fix for a Windows vulnerability that is being exploited to launch attacks against industrial control systems.
The first publicly known zero-day vulnerability to affect Windows XP Service Pack (SP) 2 since Microsoft earlier this month ended support for the platform is being leveraged to execute malware designed to steal sensitive data from critical infrastructure providers.
McAfee announced Tuesday that it has acquired Trust Digital, maker of enterprise mobility management and security software for large enterprises. The deal, terms of which were not disclosed, will allow McAfee to expand its endpoint portfolio to offer solutions to deploy, manage and secure smartphones running on platforms such as the iPhone, Android, Windows Mobile, Palm webOS and Symbian operating systems. In addition, Trust Digital's offerings will be integrated with the McAfee ePolicy Orchestrator console to offer centralized management and reporting of mobile devices. — DK
A private equity firm on Tuesday purchased a majority interest of Sophos, which recently dropped plans to IPO, for $830 million.
The nonprofit Trusted Computing Group is offering a new standard for managing clientless devices, a specification that can help organizations avoid gaps in network security.
Deploying an effective endpoint security strategy is essential in a business environment with growing numbers of telecommuters.
A new ransomware variant encrypts files on a computer, but uses a novel twist on monetizing the extortion threat.
President Obama's cybersecurity speech was the most notable information security event from the second quarter of 2009, security vendor F-secure said in its quarterly threat summary. The most notable threats from March to June included the Conficker worm, Twitter attacks, and PDF exploits. Conficker, in particular, "proved to be the most significant malware outbreak in recent years," F-Secure said. — AM
Never mind optimizing search result rankings, malicious attackers now are trying to optimize their tweets.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes