Sony BMG is not the only company to dabble in using copy-protection technology that resembles rootkits.
According to anti-virus vendor F-Secure, based in Helsinki, Finland,...
The Trusted Computing Group is one step closer to encrypting and protecting peripheral storage devices such as hard drives, flash memory drives, digital tape...
SAN JOSE, Calif.—Microsoft chairman Bill Gates, speaking on Feb. 14 at the RSA Conference here, acknowledged that weaknesses in the "trust ecosystem" could put...
Microsoft released fixes for seven vulnerabilities in its Windows products as part of its monthly security update, including an anticipated patch addressing remote exploitable...
SAN JOSE, Calif.—Microsofts Windows Defender anti-spyware application has hit the Beta 2 milestone with a major user interface facelift and complete integration with Windows...
In light of the recent controversy over several U.S. companies compliance with Chinese censorship policies, the U.S. Department of State is launching a task...
Exactly one year after the introduction of the Common Vulnerability Scoring System as a vendor-neutral standard to get around the confusion of measuring the...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...