Exceptional Software is using CipherCloud to securely move its own CRM and e-mail to the cloud, and plans to offer the technology to its defense and intelligence customers for use in private clouds.
A hands-on look at migrating biometrics applications to Amazon's cloud.
A recent survey finds most respondents believe the private sector does not need more government cybersecurity regulations or want NSA or DHS oversight.
A new hosted service uses proprietary algorithms to distinguish between human and non-human behavior in Web traffic, which could help stop DDOS attacks before they get going.
Concerned about being targeted by denial-of-service attacks while hosting the GOP convention, the Hillsborough County, Fla., Sheriff’s Office turned to security-as-a-service.
HID Global has a service that would let users replace ID credentials and tokens with their BlackBerry phones. Could it work in a government enterprise?
A recent nCircle survey shows that compliance, not risk, is still the most common security concern for feds.
A worst-case scenario could take out parts of the grid for years, according to some studies, and although equipment exists that can prevent such damage, Congress and the power industry cannot agree on action.
The codes are a known tool for delivering malware, but a recent experiment showed that security pros will risk a scan for an iPad.
Research at Fortinet confirms that old vulnerabilities are the most exploited. You might want to consider replacing XP with Windows 8, or at least 7.
Axwat MailGate combines security and policy enforcement for sharing files via the cloud.
Known vulnerabilities provide the most frequently attacked targets in commonly used software. NIST offers updated guidance for handling this crucial and challenging chore.