In Pictures: Hottest products at RSA Conference 2013
Our roundup of new security products on hand at this week's show.
View ArticleBlackBerry details extensive security protection in BlackBerry 10 OS
The recent release of the BlackBerry 10 operating system sets the stage for a security evolution as well, according to Alex Manea, manager of security services at BlackBerry.
View ArticleIn Pictures: The worst data breaches (so far)
It’s early but it has been a bad year for personal data exposure already
View ArticleSamsung exec: Smartphone of the future is bringing a technical design revolution
The smartphone of the future is going to require a "revolution" in thinking about technical design and "not enough people are prepared" for the challenges coming in here years, the president of Samsung...
View ArticleEnterprises starting to trust cloud for more sensitive apps
Trusting the cloud to handle sensitive transactions and security services isn't for every enterprise, but organisations from banks to app developers are starting to give it a try.
View ArticleSymantec software monitors sensitive Apple iOS iPhone, iPad e-mail
Symantec today said the updated version of its Data Loss Prevention (DLP) suite will be able to monitor confidential data sent by e-mail via Apple iPhones and iPads.
View ArticleThe biggest security snafus of 2013 (so far)
It's been a busy six months for security chills and spills, so here's our semi-annual update on the "biggest security snafus so far" this year.
View ArticleIn Pictures: 12 of the worst data breaches of 2013, so far
We list the worst data breach incidents recorded by ITRC
View ArticleIn Pictures: Worst data breaches of 2013 (part 3!)
The Identity Theft Resource Center has recorded 450 data breaches so far this year, and here are the worst that become known between July and September
View ArticleIn pictures: The 12 most powerful security companies
It's not just revenues and size, influence counts and excellence matters.
View ArticleIn Pictures: Hot, new products from RSA
Our roundup of new security products on hand at this week's show.
View ArticleIn Pictures: 20 infamous hacker security vendor break-ins
Here are 20 of the most notorious known break-ins over the past decade.
View ArticleIn Pictures: The worst data breaches of 2014… so far (Q1)
The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them from January 1 to March 27.
View ArticleIn Pictures: Bill Gates, superstar - His excellent adventures with the...
Just because Gates has given up his role as Microsoft's Chairman doesn't mean he's slowing down…
View Article12 "White Hat" hackers you should know
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up — as they try to stay one step ahead of their underground "Black Hat" cousins…
View Article
More Pages to Explore .....