Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM.
13 myths about information-technology security you’ll hear but should you believe?
Businesses that want to make use of consumer-grade smartphones and tablets as a point-of-sale device to process payment cards are being advised to only do so when appropriate encryption controls and other security measures are in place.
From robotic waiters and high-tech bicycles to “privacy visors,” we take a look at recent inventions that are strange but beautiful
The number of distinct Android malware specimens detected will reach 1 million this year, predicts Trend Micro in its annual security roundup report, noting that the surge in Android malware has grown at a faster clip in three years than was seen in ...
There’s a long history of free security software, and here are some of the best-known products you can try inside your own network, if only to discover how vulnerable you are.
From Microsoft and Cisco to the National Institute of Standards and Technology, we look at some of the most useful IT security websites
The amount of mobile Android malware has surged this year, from a count of 30,000 malware specimens in June to almost 175,000 last month, according to Trend Micro's Security Roundup report for the third quarter of this year.
From Apple, to Symantec and Anonymous, lots of people, companies and groups influence the IT security world
There's a growing threat of attacks on computer basic input/output system (BIOS) firmware, and to deter it, the National Institute of Standards and Technology (NIST) is putting in place new security guidelines for updating the BIOS. And in doing this...
Out of 189 breaches recorded through mid-June, here are the top 15 according to Identity Theft Resource Center.
From Lockheed Martin and HBGary Federal to the US government and Cornell University, no one is immune to humiliating security glitches
China has an extensive cyber war/espionage system.
All the highlights from RSA Conference 2012
Security experts hammer on security ideas they say are just “myths”