Pretty Good Privacy, or PGP, is an encryption method that was created in the early '90s.
Without the proper policies for implementing the technology and deploying it fully, it cannot help as it is designed to
Business networks - from SMBs to large enterprises to education institutions and everyone in between - have never been more vulnerable.
On Wednesday, Yahoo's CISO Alex Stamos announced the security measures.
Choosing the right allies to ensure security requirements is a challenge for businesses both large and small, reports James Hale.
Watching highly publicized supply-chain disasters unfold, we shake our heads in disbelief - but what supply chain risks are you taking today that would be difficult to defend tomorrow?
"Smart identification" is just one strategy seeking to replace passwords, says Google's Eric Sachs. Karen Epper Hoffman reports.
Gordon Lyon, who runs Seclists.org, will now manage the forum.
After serving as the president and chief executive officer of Symantec for less than two years, Steve Bennett was terminated by the security company on Thursday.
On Wednesday, John Cartwright, one of the list's creators, announced its closure.
The UK's Department for Business, Innovation and Skills created a plan to bolster interest in the cyber security profession.
The security community will vy for up to $300,000 in prize money as part of Cisco's Internet of Things Security Grand Challenge,
The needs of the organizations we protect are complex and the response required due to the criticality of the services we provide tends to put our multi-faceted operations in a state of flux, says Roland Cloutier, CSO, ADP.
The entire organization needs to support security initiatives, says Forrest Smith, CISO, Nissan Americas.
Cloud computing is becoming a reality that will need to be addressed by every security department.
John Gibson discusses the challenges and rewards of his security role at tTech Ltd. as the senior IT security officer.
Although industry pros are anticipating security incidents at their organizations, a recent report indicates that their computer incident response teams aren't fit to address them.
While he may not be attending the RSA Conference this year in San Francisco, the Information Security Forum's Steve Durbin hopes that there will be an emphasis on discussions that lead to increasing shareholder value.
Known for his work on car hacking in 2013, Chris Valasek, director of security intelligence at IOActive, will be sharing even more insight on automotive security at the RSA Conference 2014 in San Francisco.
With endless amounts of talks taking place at the end of the month in San Francisco, we caught up with Paul Lipman, CEO of Total Defense, to see what's on his radar for RSA Conference 2014.
There's no shortage of anticipated topics to be covered at the many events taking place in San Francisco at the end of February. In this brief Q&A, Trey Ford, global security strategist at Rapid7, discusses the ones he's most excited about.
In this interview, Nick Rowe, COO of iSEC Partners, discusses the first annual TrustyCon event, what it should be perceived as, as well as what attendees can expect.
Nawaf Bitar, keynote speaker at this year's RSA Conference in San Francisco, gives us a brief preview of his presentation, as well as some topics he believes will be heavily covered this year.
There are plenty of talks to look forward to at the RSA Conference this year in San Francisco. Larry Whiteside, chief security officer, Lynx Technology Partners Inc., shares what he thinks will be some standout topics.
BeyondTrust CEO, Kevin Hickey, will be attending the RSA Conference this year because he believes it gives security enterprises the best chance to drive both business and awareness.
Known for speaking and attending at conferences around the country, Jason Healey hopes that a lot of constructive discussions will come out of the RSA Conference this month in San Francisco.
Tenable Network Security's Jack Daniel discusses Security B-Sides in San Francisco this year, as well as some topics he thinks will be prevalent at the event, in addition to RSA and TrustyCon.
There's no denying that social engineering plays a big part in a majority of attack today, and Chris Hadnagy, chief human hacker at Social-Engineer, Inc., hopes it a big topic at the upcoming RSA Conference.
When the RSA Conference rolls around, it's a time for many industry professionals to finally catch up face to face on a lot of issues they typically communicate on via phone or email. That's what Avivah Shah, vice president and distinguished analyst at Gartner, looks forward to.
While there has been some controversy revolving around a supposed secret NSA/RSA contract, Aviv Raff, CTO at Seculert, doesn't feel it will have a major impact on this year's RSA Conference because the show doesn't have much to do with the company.