GlobalSign recently hosted a webinar discussing how to make access to sensitive data more secure. They surveyed attendees on the topic of multi-factor authentication…
Integrated Offering Enables Joint Customers to Centrally Manage Provisioning of Corporate Assets and Application Access with full Governance, Security, and Efficiency
There is a threat circulating on the Internet that I hope you will never experience. It is called CryptoLocker, and it is a form of ransomware – malicious programs that,
To developers, advertising frameworks may just be another way to make money from their free application, but in at least one case–dubbed “Vulna” by security firm FireEye
There’s nothing like watching someone trying to create a fake currency to make my day complete. Bitcoin is the silliest of ideas, even when explained in video format from the website.
One of the biggest changes to OS X Mavericks from the previous version of Apple’s operating system is its price—it’s free. It costs zero, zilch, nada.
Today’s post is all about Control 20 of the CSIS 20 Critical Security Controls – Penetration Tests and Red Team Exercises (the last post pertained to Control 19).
Security developers have released a stripped-down privacy-friendly browser, Aviator, based on the open source browser core Chromium as used by Google Chrome.
A US district court has ruled that anyone calling themselves a “hacker” loses their Fourth Amendment protections against unreasonable searches and property seizures.
The National Institute of Standards and Technology (NIST) today released its Preliminary Cybersecurity Framework after having missed the initial October 10 deadline for the draft to be posted for review and commentary