Security

Articles

Spikes Security Unveils Web Gateway to Isolate Malware

Spikes Security CEO/CTO Branden Spikes says the Isla appliance takes advantage of advances in remote networking, virtual machines, JavaScript, HTML5 and a new transport mechanism to render content on an appliance. More >

Job Description: Senior Software Security Engineer

The Senior Software Security Engineer is responsible for building a world-class program that embeds security into every aspect of the dev process. More >

Good Technology Expands Support for Apple Watch

Good Technology CEO Christy Wyatt says initially it was relatively simple to extend the application programming interfaces (API) exposed by Apple to deliver simple notifications to the Apple Watch. More >

App Development: Getting More Complex

Try keeping up with the relative merits of different approaches to development, emerging ways of customizing apps based on data gathered about the device’s user and, as always, the status of security. More >

Is Your Website Failing to Keep Customers’ Data Secure and Private?

OTA analyzed approximately 1,000 websites in three categories: consumer protection, privacy and security. More >

Don't Let the IT Security Paradigm Shift Leave You Stranded

While funding and awareness have increased, it is unclear if organizations are making investments that keep up with the evolving security landscape. More >

More Articles >

Interviews

MacKeeper Has More Work to Do to Clean Up Its Act

A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.

More >

A Conversation About Symantec’s 2015 Internet Security Threat Report

A Symantec exec breaks down the three main categories of cybersecurity threats.

More >

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.

More >

More Interviews >

Most Popular Features

Five Trends Shaping the Future of IT

Five technology and operational trends that will help corporate IT organizations deliver better business outcomes via the optimal use of technology.

LastPass Breached Again. Is This a Trend?

LastPass has been breached. Again. For at least the third time now since 2011. At what point is something an anomaly and at what point is it a trend?

Ten Top-Paying Tech Security Jobs

According to a new analysis of Dice salary data, the need for security professionals has translated into salaries for certain tech professionals that greatly exceed the baseline for tech-pro salaries.

Related IT Downloads

Misc29 Interfaces for Personal Identity Verification

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date