10/25/2013 - A growing and nefarious cyberattack category, called advanced persistent threats, is a major concern for both governments and private enterprises that want to prevent their proprietary information from being stolen or damaged.
10/24/2013 - It’s a given that Bring Your Own Device policies have become a security challenge that enterprises must grapple with. Companies are turning to mobile device management (MDM) solutions to control the wealth of gadgets living on their networks.
09/30/2013 - Companies are increasingly turning to cloud-computing technology to manage their informational assets. This 2013 study by IDG Enterprise looks at facts and figures behind the types of cloud services businesses are choosing.
09/10/2013 - Syria's prime minister says his nation will accept a proposal to relinquish its chemical weapons stockpile to international control to avoid a military strike, France will bring a formal resolution to the U.N. security council on the proposal, more technology companies file suits with FISA for more details on its secret spying program, and more.
08/28/2013 - The Cloud Security Alliance has created a new working group to focus on the examination of incident handling and forensics in the cloud environment. In its first white paper, Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing, the group aims to help practitioners define standardized processes for conducting forensic investigations.
08/28/2013 - Prolexic, a network security solutions company that provides mitigation against DDoS attacks, has published a report containing the latest facts and statistics on DDoS attacks from the second quarter of 2013 here.