Protecting mission-critical systems against cyber attacks has become a national priority for government, critical infrastructure and military sites, and a business priority for corporations.
Nation-states can now skip over costly and time-consuming R&D by stealing corporate and government data and turning that information into a competitive advantage.
Our special Spotlight series is back for the holidays, this time with a fresh focus on social media and its security and privacy ramifications.Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.
As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.
This infographic created by WhiteHat Security, provides insight into the state of website security and issues organizations face today.
This month's threat stats indicate that the encounter rate of web malware across the retail and wholesale industry was over ...
In this month's global threat map, events across the globe are highlighted that include the sentencing of a man who ...
The final day of the conference held in London may have ended earlier than the first two, but the showroom ...
The action continued on Day Two of the InfoSecurity Europe conference in London. With engaging and compelling presentations, keynotes, and ...
A highly regulated debt collector from the U.K. needed to achieve compliance, but it wanted to scrap all of the point solutions on which it traditionally relied.
Video game players are used to fending off alien invaders, but the IT staff at Electronic Arts (EA) was challenged to reduce cyber risk within its own environment.
The apps used on mobile devices connected to its network contained sensitive data, so a medical device manufacturer needed to ensure that access control and authorization policies were enforced.
Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when it comes to privacy and security issues.
Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment policies at conferences.