There are several essential questions to consider in picking a cloud provider, including what level of security is needed for services your agency is moving
Bulletins coming on Sept. 11 Patch Tuesday will include fixes for developer tools and server software.
In certain places, traveling feds can almost count on an attempt to steal information from their laptops. Here are ways to give them the old Willy Wonka.
Organizations with strong security practices are more likely to entrust their data to cloud providers, according to a recent survey by the Ponemon Institute.
People are starting to get suspicious about what apps take from them, and are declining to download, a Pew study shows.
Connect AnyApp encrypts data in transit, in use and at rest for Web applications and services such as Salesforce.com, Gmail, Office 365 and Amazon Web Services.
Acknowledging Congress' failure to pass cybersecurity legislation, Democrats assert the president’s willingness to act on his own through executive order.
With millions wondering if their device identifiers are included in the reported breach of FBI files, the FBI and Apple clam up, leaving users vulnerable to scammers offering to fill the information void.
Recent attacks illustrate the growing professionalism of malware developers, analyst says.
Researchers at Rutgers have developed a prototype device that lets you authenticate with the swipe of a finger.
Mobile computing and the cloud, which each have their own security concerns, have become inseparable.
The AISight cameras used during the Republican convention adapt to their environment to determine if anything is amiss.
The zero-day window for the latest Java vulnerability has officially closed, but agencies still have to decide whether the benefits of running Java on their computers outweigh the risks.
TrustCall system can turn almost any Android phone into a secure communication device.
The rare out-of-band update closes holes being exploited in attacks, at least some of which are coming from China.