A recent study from HP and the Ponemon Institute surveyed more than 5,500 IT professionals, from operations to security management, to gauge potential problems with...
A story about hackers utilizing complicated exploits to infiltrate a computer network is sure to generate headlines. But sometimes it’s the devil you know...
What Happens When Data is Separated from the Systems and Applications that the Data Owners control?Cloud computing, virtualization, mobile devices, and social networking are...
After a laptop computer was stolen in October, Sacramento, California’s Sutter Health is informing over 3.3 million patients that information in their records is...
SecurityWeek will host a live webcast with Mocana, on Wednesday at 1PM EST, showing how organizations can protect corporate information by adding fine-grained security policies...
Quarri Technologies, a firm that focuses on secure browsing sessions, has received $3M in Series B funding from the Houston Angel Network (HAN) which...
Inside the collapse of IronNet: Some say the firm collapsed, in part, because it engaged in questionable business practices, produced subpar offerings, and could...