Security | News, how-tos, features, reviews, and videos
In an exclusive interview with CIO.com, the FBI official in charge of cybercrime speaks for the first time with the media specifically about hacktivism. Here, Assistant Executive Director Shawn Henry describes the threats hacktivists pose, the challe
FBI nabs 'Anonymous' hacker who went after site of KISS leader Gene Simmons
Having grown up with the web, KTDs are more familiar with different parts of it while also being a lot less savvy about using it.
A cancer diagnostics firm is using a single sign-on service to secure a growing pool of SaaS subscriptions.
When evaluating security service edge vendors, it’s critical to ensure their cloud-delivered security services provide the right data protection. Here we examine some real-world examples of how various data protection technologies can come into
Even though Apple's competition will not catch up next year, expect an exodus of talent in Cupertino in 2012 and perhaps some internal drama at the top of the Apple organizational chart, say tech analysts.
Social media connects businesses with the informed consumer—to not be a part of this is missing a critical opportunity.
The death of Steve Jobs, Android, Anonymous, AT&T-T-Mobile, HP boardroom drama, earthquake aftershocks, and Egypt going offline all make top headlines.
CIO.com's Al Sacco gathers a handful of mobile and wireless predictions from industry experts on subjects like mobile malware, mobile payments and location-based services and offers his take on which predictions will come true--and which will fa
Security labs u2014 such as at Symantec, VeriSign, McAfee, Kaspersky and Kindsight u2014 are developing technology that could strengthen your IT security policies. The projects include stopping rootkits at the silicon level and preventing employees f
Challenged by HIPAA privacy requirements and mobile-device limitations, United Orthopedic looks for a device- and hardware-independent mobile strategy
Sponsored Links