Jury Still Out On Mobile Adware
Malicious software or not? Defining the threat on mobile platforms becomes more difficult as some advertising software enters a gray area
Cloud Means More Secure Remote Access
Connecting hosts running remote-access services directly to the Internet is so last decade. Instead, companies look to move to cloud-enabled services or virtual desktop infrastructure.
EU Data Rules Worse Than SOPA?
European Union's proposed "right to be forgotten" data privacy rule threatens free speech and online business, critics argue.
Do You Need A Security Operations Center?
When a company starts to worry about losing data to attack, it could be time to create a simple SOC. Following are the most important steps to evaluating the need for an effective operations center
The Future of Web Authentication
Many security experts believe the Internet's trust model is broken. Figuring out how to fix it will take time and collaboration
Pwn2Own Hacking Contest Gets Facelift
Popular competition will up the ante with longer contest, fewer targets, more payout for first-, second-, third-place winners--plus an extra Google bounty for cracking Chrome.
Videoconferencing Can Be The Bug In The Boardroom
Recent research underscores that insecure video conferencing systems can allow hackers to listen into a company's confidential discussions. Firms should take steps to evaluate their systems and secure them