The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."
Our special Spotlight series is back for the holidays, this time with a fresh focus on social media and its security and privacy ramifications.Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.
As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.
Among other notable factoids, this month's global threats map indicates that Belarus was the leading source of all zombie IP ...
Based on McAfee Labs Research, this infographic attempts to predict the state of malware in 2013, including new threats and ...
According to this month's threat stats, the total number of records containing sensitive data involved in breaches in the U.S. ...
This month, we continue our periodic look at the hot product groups that are shaping the information security marketplace. Here ...
After dissecting some of the top Unified Threat Management (UTM) tools out in the market, the SC Lab team reported ...
A highly regulated debt collector from the U.K. needed to achieve compliance, but it wanted to scrap all of the point solutions on which it traditionally relied.
Video game players are used to fending off alien invaders, but the IT staff at Electronic Arts (EA) was challenged to reduce cyber risk within its own environment.
The apps used on mobile devices connected to its network contained sensitive data, so a medical device manufacturer needed to ensure that access control and authorization policies were enforced.
Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when it comes to privacy and security issues.
Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment policies at conferences.