Data Protection | Network Security - News, Features, and Slideshows
The eBay database breach that led to the theft of customers' passwords and personal information started with the compromise of employee login credentials, a reminder that companies should check the safeguards in place for protecting such critical information.
Companies have shortened the amount of time between malware infection and discovery, but too few organizations detect the breach on their own, a security report found.
LexisNexis, Dun & Bradstreet and Kroll Background America hacks raise more doubt on the effectiveness of knowledge-based authentication
Consolidation of the Defense Department's 15,000 networks expected to cut costs, as well as improve security against Edward Snowden-like leaks
Like U.S. corporations, universities are battling a growing number of cyberattacks, believed to be mostly from China
Sign up now »
Protect resources and ensure security compliance through incident detection, response, and remediation.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.