I get very worried when I agree with Donald Trump about anything. But I have to agree (sort of) with his view on the dispute between the FBI and Apple over access to an iPhone used by one of the terrorists in the San Bernardino attack.
More than one-quarter of all successful enterprise software exploits in 2015 used a vulnerability that dates from the 2010 Stuxnet attack, even though it has been patched twice, according to an annual cyber-risk report by Hewlett Packard Enterprise.
Intel Security (formerly McAfee), Kaspersky Lab, Sophos, Symantec and Trend Micro are leaders in the enterprise endpoint protection market, according to Gartner's latest Magic Quadrant for Endpoint Protection Platforms published earlier this month.
A vast majority of employees today work from mobile devices, but managing mobile devices – both company and employee owned – is a universal challenge. This challenge is equally as pressing for small and medium-sized businesses (SMBs) as it is for large enterprises. Chris Pyle, president and CEO of Champion Solutions Group, offers five ways SMBs can improve their mobile security posture.
I sat down recently with Steve Durbin, managing director of the Information Security Forum, to discuss the threat that insiders pose to organizations and what can be done to stop them.
Landesk has added a mobile security suite, which includes secure mobile email, app rapping and secure mobile browsing, to its endpoint management and security product offerings.
Chief information officers at utilities in Western Europe identified cybersecurity as their top IT spending priority this year, according to a survey by market research firm IDC.
This year is expected to be as bad, if not worse, than last year in terms of cyberattacks. Looking into its crystal ball, IT security firm Cybernetic Global Intelligence has identified five cybersecurity trends for 2016 in this infographic.
Google announced Monday that it patched a critical vulnerability in the Android mediaserver that could enable a remote attacker to gain control of a device through email, Web browsing and multimedia messaging service when processing media files.
Mobile security threats have become more sophisticated and devastating over the past few years, while the future holds more attacks exploiting the Internet of Things and other emerging technology,