VIDEO: Dave Frymier, chief information security officer of Unisys, discusses some of the tools and processes he uses to keep his organization and its customers safe.
A new survey from NYSE Governance Services and Veracode on current IT security attitudes and trends finds that boards are taking cyber-security very seriously.
VIDEO: Jason Sabin, chief security officer at DigiCert, discusses the challenges and the opportunities for security today and for the coming Internet of things world.
A text message is circulating that crashes the Messages app on iPhones and other Apple devices because of a flaw in how iOS handles Unicode.
Seven cyber-attacks in the first quarter of 2015 revealed previously unknown flaws in Adobe Flash and Windows products, as attackers focused on finding flaws in ubiquitous software.
New functionality includes enhanced provisioning capabilities for Google Apps, support for Android devices and the first-ever integrated Chromebook password sync.
Ponemon's 2015 Cost of Data Breach Study pegs the average cost for a data breach at $3.8 million and malicious attacks as the No. 1 cause of breaches.
Security experts were not surprised about the disclosure of the IRS breach, which they say raises questions about the tax agency's incident response.
NEWS ANALYSIS: The next question is whether the Senate will vote to approve the Freedom Act or will simply allow the Patriot Act sunset provisions to kick in.
Providing security in OpenStack is not as easy as simply deploying a firewall and enabling antivirus. Many additional controls need to be deployed.
A fear of falling prey to ransomware convinces companies to be more systematic in their backup and restore strategies and to try out new technology.
The Estonia-based company claims its keyless methodology eventually will replace RSA for authentication and digital signatures.
The NSA and some of its overseas counterparts reportedly were aiming to use data links to Google's mobile app stores to put spyware on users' smartphones.
Imagination's OmniShield offers scalable security and multiple domains for newly connected devices, such as those that make up the Internet of things.
Fifty-five percent of all retail sites and half of all health care sites were vulnerable every day in 2014, according to a report by WhiteHat Security.