Harrison Ford rocked as the brainy, swashbuckling Indiana Jones. His swaggering Han Solo will be remembered for years to come. But it seems these unforgettable ...
Kim MacPherson has taken over as vice president of engineering for PassMark Security, a developer of authentication solutions for ecommerce. MacPherson has been vice president ...
Anti-threat software better addresses malware threats than best-of-breed suites.
Backup security tapes from the Orlando, Florida corporate offices of hotel giant Marriott International went missing in late December, leaving the personal information of more ...
As the new year began, security professionals were left in a hole. With an official patch for a recently discovered Windows meta file (WMF) vulnerability ...
What do you like most about your job? It’s a position of perpetual changes and new learning opportunities on a daily basis. I get to ...
<p>I had a very interesting conversation with a colleague recently. He had a disturbing take on the state of information security and, particularly, practitioners (of ...
With the growing prevalence of web-based applications and a growing demand for interoperability among identity-related services, a call has emerged for standards to facilitate this ...
<p>Three or four years ago Howard Schmidt commented that we should have moved away from username and password as an authentication mechanism years before. I ...
Send your comments, praise or criticisms to SCFeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
This year's RSA Conference will show off competitors' vulnerability knowledge.
The RSA Conference will celebrate its 15th anniversary this year. How has it evolved to keep up with the times?
Ever since written communications began there has been a need to keep some of these communications more secure and private than others. Today, much of ...
When it comes to safeguarding electronic paper trails, Tess Koleczek is a master.
Enterprise database infrastructures, which often contain the crown jewels of an organization, are subject to a wide range of attacks. The most critical of these ...
As RSA Conference celebrates its 15th anniversary, we thought it only appropriate to find out from leading information security players what they think the industry ...
Predictions, like fog, are hard to get your arms around, but here is one that will prove more than just a mere exercise in prophesizing: ...
Former Secretary of the Department of Homeland Security (DHS) Tom Ridge says that no matter if discussions are about cyberterrorist attacks launched at federal agencies ...
A CIO for a marketing company was in a state of panic. He recently received a 20-page information security audit questionnaire from one of the ...