Heartbleed made most certificates vulnerable. The future problem is that quantum decryption will make all certificates and everything else using RSA encryption vulnerable to...
A recent study from HP and the Ponemon Institute surveyed more than 5,500 IT professionals, from operations to security management, to gauge potential problems with...
A story about hackers utilizing complicated exploits to infiltrate a computer network is sure to generate headlines. But sometimes it’s the devil you know...
What Happens When Data is Separated from the Systems and Applications that the Data Owners control?Cloud computing, virtualization, mobile devices, and social networking are...
After a laptop computer was stolen in October, Sacramento, California’s Sutter Health is informing over 3.3 million patients that information in their records is...
SecurityWeek will host a live webcast with Mocana, on Wednesday at 1PM EST, showing how organizations can protect corporate information by adding fine-grained security policies...
Quarri Technologies, a firm that focuses on secure browsing sessions, has received $3M in Series B funding from the Houston Angel Network (HAN) which...
Database security and risk management vendor, Application Security Inc., has introduced updates to its product line, keeping to the company’s tradition of making database...
Baltimore-based data protection vendor SafeNet, said on Friday that it has received baseline approval from the US Government for its new MDeX system.MDeX, or...
Cisco warns that nation state-backed hackers are exploiting at least two zero-day vulnerabilities in its ASA firewall platforms to plant malware on telecommunications and...