Intel launch in pictures
19 Jan | View galleries
Attackers have set up around 10,000 malicious subdomains on accounts belonging to GoDaddy customers, according to a new report from Cisco's Talos Security Intelligence and Research Group.
ForeScout has named a new CEO who has big plans for making the company's products the remediation layer of choice for other vendors' security offerings that find problems with endpoints but can't fix them.
We're conditioned almost constantly to protect our passwords. Don't write them down. Don't store them in a Word doc on your desktop. Don't share your password over the phone or by email. Don't ever give your password to anyone under any circumstances. The gray area comes with whether to share your password with significant others.
As the Internet of Things develops, most vendors that are making these things don't make security their top priority, allowing business considerations to take precedent, according to a Gartner expert.
Restrictive governments getting better at Internet censorship ... Facebook supersizes its open networking switch ... Apple shaking indentured servitude out of its supply chain ... and more news.
In our recent article, we highlighted that every significant and public attack exploited people to either get an initial foothold in a target organization or as the entire attack vector. These attacks highlight the need for awareness as a top concern of security programs.
Facebook is laying odds that artificial intelligence (AI) can trump human intelligence – or, to be more precise, a lack of human intelligence.
These days, and with the help of Cisco and EMC, Intel is dipping its toes into the networking and storage ends of the enterprise technology pool. Add this to Intel's server expertise and the data center of the future may be at hand.
Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun
For years now I've harangued relatives about their shoddy password practices. Either they use easily-hacked passwords or forget the passwords they've created--sometimes both.