RSA Conference, One Year Later
How I hope history has reshaped this year's RSA Conference one year after one of the most significant breaches in the past decade
Bots: Stand Up And Be Counted
A new FCC-backed initiative will gather real ISP data on infected bot machines, but will it make a dent on the botnet scourge?
RSA Preview: 5 Hot Security Worries
From securing mobile devices to spotting and stopping APTs and hacktivists, here's what's keeping security managers awake at night--and what will dominate discussion at the upcoming RSA conference.
Do Not Track: 7 Key Facts
Key provision in the Obama administration's new Consumer Privacy Bill of Rights has benefits and limitations. Check out some of the compromises.
Mobile Devices Just Another Endpoint
Two mobile security surveys out this week show that as mobile devices are more tapped into mission critical systems, security focus must remain on the data
Web Encryption That Works
SSL technology isn't perfect, but it can be an effective security tool for your organization. Here are four tips for optimizing its performance
How Anonymous Are Your Online Posts?
Beware flamebait-throwers, grammar police, and all-around trolls: New algorithm can correctly identify an author 80% of the time, using sufficient source documents.
Bank Customers Favor Birthdate PINs
Too many people use a date for their bank card PIN, giving attackers an edge in figuring out the number, reports Cambridge University researchers.
Disclosure Clouded By Obscurity
Shockingly, the responsible disclosure debate rears its head once again, and amazingly enough some vendors still don't get it. Guess we'll never learn