
The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.
A session on spear phishing dissected a slew of attacks used against organizations.
CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.
Researchers at AlienVault are tracking the moves of a highly skilled espionage group, likely nation-state backed and operating out of China, that has hit two U.S. manufacturers of solar panels.
From a jammed-pack vendor floor to insightful sessions with some of the leading minds in information security, there wasn't a dull moment at this year's big event in San Francisco.
We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.
IT departments with a block BYOD policy should be wary of these common workaround attempts or hacks.
Today's businesses are subject to more rigorous IT compliance and security requirements than ever before.
For those of us who have been pursuing an effective public-private threat sharing mechanism, there's hope that maybe this time a program will be developed that effectively accomplishes this task.