Secure access to information is vital when it comes to Department of Defense intelligence data.
This is why the Defense Intelligence Agency—a DOD combat support...
Intellectual property regulation in the United States is out of control. The thicket of legislation, policy and precedent through which we grant private monopolies...
IT folk in corporate America spend many a sleepless night fretting over network security and how to prevent denial-of-service attacks or downtime that can...
Levi strauss, one of the nations largest clothing manufacturers, confirmed April 28 its testing of RFID "hang tags" on clothing shipped to two retail...
The it industrys largest players keep baking more defense features into their products—a trend that could accelerate the rapid shifts in a market experts...
Symantec is relaunching the anti-phishing industry group gained via its 2005 acquisition of WholeSecurity and is promising to sign on some well-known participants, in...
Check Point Software Technologies introduced its newest package of enterprise security applications on May 8, rolling out new capabilities for using so-called unified threat...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...