Mobile security: The old ways don't cut it
Many organizations mistakenly think that traditional IT infrastructures can support mobile security, experts say.
Many organizations mistakenly think that traditional IT infrastructures can support mobile security, experts say.
A Cambridge study concludes that spending on security products greatly outweighs the costs of cyber crime and that it would be better to just go after online criminals.
As defense agencies embrace cloud computing, many are finding that cloud solutions deemed good enough for consumers can't handle their unique requirements.
Justice says a 23-year-old tried to sell an FBI undercover agent access to an DOE supercomputer for $50,000.
By switching to Google Apps, GSA reduced server energy consumption by nearly 90 percent, a report states.
The hack by a previously unknown group could have exposed some personal data on as many as 110,000 current and former employees and students.
Information that was supposed to be kept private on applicants for new generic top-level domains was inadvertently posted as part of ICANN's Reveal Day.
A recent survey suggests CEOs and CISOs don't speak the same language. Maybe it's time for government to set some generally accepted standards for information security.
The automated updater will flag digital certificates considered untrustworthy to counter the spyware's spoofing tricks.
An agency pilot program pursues data provenance, which seeks to trace the origins, accuracy and life cycle of the data NSA collects.