Though it is difficult to quantify ROI for security initiatives, investment in application security is logical for the enterprise, reports Jim Romeo.
The power of information as a commodity only continues to deepen as it satisfies so many disparate needs and wants.
A number of experts weighed in on this month’s debate concerning a statement from DefCon founder Jeff Moss that feds should stay away from DefCon.
September’s threat of the month is the Android master key vulnerability, which can bypass signature verification to gain full system-level access.
News from AirTight Networks, Seculert, Hackett Security, MobileSpaces and others.