Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
F-Secure detected 88 variants of the malware, which infected companies in Europe, as well as a California firm.
Nearly 70 percent of critical infrastructure organizations said they experienced a security compromise in the last year.
The Chairman and CEO shared the revelations at Australia's National Press Club.
Security personnel are busy mitigating infrastructure attacks rather than protecting their organizations, say experts at SC Congress Toronto.
Citicus ONE is an integrated system for organizations to automate their IT governance, risk and compliance management processes.
The Department of Homeland Security revealed that the hack occurred through an ICS-CERT newsletter.
Experts discuss the most dangerous new attack techniques, which include point-of-sale malware, mobile and wireless threats, and compromise of industrial control systems.
These are not devices your parents used back in the day. We've come a long way and most of today's devices can be an endpoint, which needs protecting, says Peter Stephenson.
The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're all swimming in the same pond and they all are susceptible to breaches that involve social media use. And how do most people use social...
There was a noticeable chill in the air at Black Hat and DefCon, due to recent action taken against security researchers, reports Dan Kaplan.
Nation-states are extricating intellectual property from U.S. government entities and private corporations, reports David Cotriss.