News & Analysis
It's all about how to integrate user authentication automatically into the user experience (UX), so that the user doesn't have to think about checking into or turning on a device in a secure fashion.
REVIEW: Lenovo’s latest entry into the X line of business ultrabooks brings back the touch screen and improves performance as it moves to its sixth generation.
Microsoft's system for scalable cloud applications now includes support for clusters based on Red Hat Enterprise Linux 7.4.
Former NSA Director General Keith Alexander and Nadav Zafrir, former commander of Israel's 8200 Intelligence Unit, are optimistic about the future.
DAILY VIDEO: Sony unveils the larger, faster Xperia XZ2 Premium smartphone, and Microsoft joins Facebook and RSA in the Cyber-Security Tech Accord.
From phishing tools to technology that better secures containers and the cloud, myriad new and updated products debuted at the big cyber-security conference.
VIDEO: Tom Corn, senior vice president and GM of security products at VMware, discusses how companies can create a least privilege model for improving cyber-security.
A survey conducted by Oracle and KPMG finds that too often inadequate attention is paid to implementing strong security measures when meeting urgent demand to deploy new cloud services.
The move means that the collaboration services and applications from WebEx and Spark will now be available on a single platform from Cisco