The vendor HyBlue says it can prevent the "cold boot" encryption hack discovered by Princeton researchers with a laptop security product announced Tuesday.
Jon Brodkin |
14 May |
Read more
It used to be easy for US Bank to determine which users and systems could be trusted, and which should be viewed with suspicion. Then along came Web 2.0.
Jon Brodkin |
01 May |
Read more
Oracle released 41 security fixes for its flagship database and several other products Tuesday, including 15 patches for vulnerabilities that can be exploited remotely without a username or password.
Jon Brodkin |
16 Apr |
Read more
Bookmarking these sites will help you protect your network, comply with government regulations and stay ahead of all the latest threats.
Jon Brodkin |
08 Apr |
Read more
Jeff Jonas knows the Las Vegas gambling industry inside and out. As the founder and chief scientist of Systems Research & Development (SRD), Jonas helped build numerous casino systems before 2005 when his company was purchased by IBM.
Jon Brodkin |
10 Mar |
Read more
IBM upgraded its identity management capabilities with tools to help customers manage user access to sensitive information, the company said Wednesday.
Jon Brodkin |
13 Dec |
Read more
Enterprises are not prepared for the security threats posed by Web 2.0 technologies, because they use insufficient Web filtering and have failed to train users and make employees aware of potential risks, a vendor-sponsored survey claims.
Jon Brodkin |
09 Oct |
Read more
Web security is at the top of customers' minds after many well-publicized personal data breaches, but the people who actually build Web applications aren't paying much attention to security, experts say.
Jon Brodkin |
05 Oct |
Read more
If he weren't so ethical, Markus Jakobsson could be a world-class online fraudster. In a way, he already is.
Jon Brodkin |
10 Aug |
Read more
Short of strip searching employees every time they walk out the door, there's probably nothing Boeing could have done to prevent the alleged data theft that has a former employee facing criminal charges, security expert Bruce Schneier says.
Jon Brodkin |
16 Jul |
Read more
Any chief security officer can tell you there's a fine line between managing risk and fostering innovation. And the CSO's relationship with the company's CIO largely determines where that line is drawn.
Jon Brodkin |
06 Jul |
Read more
The first step in protecting your enterprise is figuring out how to destroy it. That's the approach to security taken by Jonathan Clemens, manager of enterprise security oversight at Intel. He recommends that companies conduct wargames to find their biggest weaknesses.
Jon Brodkin |
19 Feb |
Read more