Privacy concerns are top of mind in light of revelations about NSA data collection
Two-step identity verification and analysis of user trends could prevent future attacks, experts say
Not much is happening on the physical network any more
Admins can manage Evernote-like applications but never fully control them
A look at some of the key points made by Dotcom during the press conference at his mansion
Least privilege management has still not gone mainstream
From Wi-Fi to mobile security, here are 11 things you should commit to doing this year to keep hackers and malware at bay.
How Windows 8 Professional and Enterprise users should encrypt their external drives—for free.
The first problem that we lawyers have when we hear "data" and "cloud" used in the same sentence is that data is valuable, and the cloud concentrates that value
The relevant technologies and tools are available to enable your staff to do their jobs without compromising corporate data
At Palo Alto Networks conference, one security expert explains why
Taking a proactive approach to fraud detection can help firms protect their money and reputation
There are unique differences and threats specific to each smartphone - so which is the best?
Locking down contracts and auditing are absolutely key, say security experts
Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun
The attack caused problems for the global Internet
Samsung KNOX and BlackBerry BES and Balance prepare for battle. May the best cross-platform solution win
Graph Search makes it easier for cyber criminals to gather relevant details that can be used to target phishing attacks more effectively
Mobile worms that buy malware from app stores, ransomware
What can you do if your antivirus software (in this case Norton) identifies a program as a Trojan, but you're pretty sure it's not?
The iLivid installation routine put several unwanted programs on Threaddy's computer. Why didn't Norton block the program as malware?
Security built in at the level of microprocessors is finally starting to look like a viable layer of defence
There is a war to prepare for - a cyberwar. Sun Tzu's Art of War offers much guidance
Hardware giant sets its sights on systems management, security software and business intelligence
Gartner says cloud SLAs are 'weak but improving' - but just how effective are those controls?