Incident response has become an integral part of IT security and NIST offers updated guidelines for handling breaches.
Mobile apps often take liberties with your personal data; this tool lets you know what they're up to.
The attack, which started Aug. 3, started as WikiLeaks was releasing information on an allegedly secret, sophisticated surveillance program.
If your agency delivers information and services through website applications, be ready for plenty of "battle days," according to an Imperva study.
Discovery of the state-sponsored (wink, wink) Gauss malware proves once again that, in cyberspace, nothing stays secret for long.
The ransomware can download from a compromised website and freeze a user's computer, demanding that they pay a 'fine.'
Alaska's enterprise architect offers tips for overcoming migration hurdles to deploying so-called fabric or unified computing.
A survey of managers finds that a majority have little or no knowledge of how their providers protect their data.
HIPAA Essential from StillSecure can help organizations meet the requirements of the HITECH Act.
Despite the growth of advanced threats, there's still plenty of old-school, low-imagination spam going around.
The cyber maneuver technology would randomize configurations and other aspects of a network to fool and foil intruders.
Senators' claims that critical infrastructure is vulnerable to a "few keystrokes" belie its resilience and obscure the real threats.
Illinois center will include more military commands, educational institutions and other federal agencies.
The systems, which can capture up to thousands of images per hour, are increasingly popular with police but are raising privacy conerns.
The Basic Input/Output System that boots a computer could be an attractive target for sophisticated exploits, and the complexity of servers creates specific challenges that NIST addresses in new security guidelines.