Adjoining islands: Security convergence
Turf wars remain a major roadblock to embracing the merger of physical and logical security. But Honolulu CIO Gordon Bruce believes the right time for such a project is now.
Turf wars remain a major roadblock to embracing the merger of physical and logical security. But Honolulu CIO Gordon Bruce believes the right time for such a project is now.
Organizations are working overtime to design ways to control, via policy and technology, employees’ penchant for sharing private information across social networking and mobile devices.
The FTC settled a case with Upromise after it failed to encrypt information and provide details about its data collection practices.
An enhanced volume of sharing is allowing critical infrastructure operators and government agencies to better defend themselves from attacks, says Mark Clancy, The Depository Trust & Clearing Corp.
Debate: M&A activity in the cyber security arena will significantly increase in 2012.
While many mobile applications do what they’re supposed to, countless others carry malware.
This month’s First Look specializes in whole disk encryption and, unlike many other products, can do the entire process of encryption and encrypted disk access throughout the enterprise.
If one wants to address a vulnerability, one needs to add vulnerability management.
Anonymous strikes again, massive cyber fraud scheme busted, certificate authorities, and more.