The latest reports on the NSA's surveillance could raise awareness on a practice that is regularly recommended but frequently ignored.
Last year, a University of Texas professor's team took control of a drone in flight. This year, it was a super yacht on the Ionian Sea. But they’re also evaluating ways to prevent spoofing.
The moves to cloud computing and shared databases are among the factors driving e-authentication.
Seculert's cloud-based advanced threat protection solution features Elastic Sandbox technology, an updated API and a new user interface.
The Aegis Padlock Fortress is hardware-encrypted, PIN-authorized and meets 11 cryptographic security metrics.
NIST offers updated guidance for dealing with the complexity of managing patches in an enterprise.
Big data, which involves a lot more than large databases, complicates security, but there are steps agencies can take to protect their information.
The source of an apparent breach of Stanford University's network is unknown, but it comes as universities are seeing an exponential increase in attacks on their networks.
Organizations can take steps to protect their data from network and server administrators who go rogue.
The government's new intrusion prevention system will not only detect malicious traffic but stop that traffic before it does harm.
Revised guidance from NIST on defending against malware reflects the evolution of malicious code, which is becoming more complex, dangerous and difficult to detect.
The switch, the first secure KVM for Display Port, would allow government users to access secure and nonsecure networks using a single monitor.