Web Application Firewall, version 7.8, aimed at reducing impact of automated attack attempts from botnets
Crosswa.lk has developed an API that lets app creators post links to their iOS apps on websites so users can download them without visiting iTunes. CIO.com blogger James A. Martin says the idea is a novel one, but it needs work.
Organizers have confirmed some early details on Briefings talks
Information-stealing malware campaign spreads via phishing email attachments posing as Indian military secrets
Risk-based security decisions usually yield more secure environments, but some harmonization with regulations needs to be done to prove compliance
The BlackBerry has always been a business phone. The iPhone wowed us all--and it nearly put BlackBerry out of business--but it emphasizes entertainment and not productivity. If you're an IT executive, it's finally time to put function before form, CIO.com columnist Rob Enderle writes.
In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.
Employees can safely access content from their personal mobile device in a secure, encrypted container
Fixmo SharePlace enables secure and compliant access to SharePoint from Apple iOS and Android devices
Built on the concept that only known devices should ever access a protected network
U.S., other national government agencies, contractors, and military networks found housing new Pushdo bots as botnet adds stealthier features to evade detection, takedown
Prison time marks the end of a prominent chapter in hacktivist history, one security researcher says
Revenue totaled $7.9 million for the first quarter of 2013
Members provide strategic and technical input to PCI SSC on specific areas of Council focus
Solution features Approved Scan Vendor (ASV) vulnerability scans
Most companies continue to try to protect themselves using approaches that are years out of date, according to a new how-to book published by ISACA and written by Ernst & Young
Centrify for NetSuite is a free solution for Active Directory-based NetSuite single sign-on
Shortage of training among developers is a key cause of high vulnerability rates, (ISC)2 survey says
The malware universe is typically divided into targeted attacks and mass, opportunistic attacks, but a middle category -- mass customized malware -- poses a more serious threat for business
Announced its financial results for the first half of fiscal year 2013