Dell Software Wednesday introduced a suite of software and services for enterprise mobility management, including a "secure workspace" for mobile devices that lets enterprise IT managers separate work from data apps.
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies.
Akamai Technologies today has agreed to acquire Prolexic Technologies, a distributed denial-of-service (DDoS) mitigation services company, for $370 million.
Verizon today said it is rolling out digital certificate services aimed at the "Internet of things" in order to provide security and authentication for machine-to-machine systems.
In connection with its NSX network virtualization software effort, VMware is teaming with Palo Alto Networks to jointly develop a virtualized network-generation firewall (NGFW) tightly integrated with VMware's platform.
HP today said security testing it conducted on more than 2,000 Apple iOS mobile apps developed for commercial use by some 600 large companies in 50 countries showed that nine out of 10 had serious vulnerabilities.
IBM Wednesday announced an agreement to acquire Fiberlink Communications, saying the purchase is a key part of a broader mobile-security strategy to provide assurance in transactions conducted via devices such as iPhones and Android smartphones.
Two teams of Japanese "white hat" hackers have been declared victors at HP's Pwn2Own 2013 contest in Tokyo today for finding zero-day exploits that allowed them to compromise the Apple iPhone 5 and the Samsung Galaxy S4.
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.
There are now resounding calls to drastically change the secretive National Security Agency in the wake of the documents leaked by former NSA contractor Edward Snowden. Some advocate a completely re-made spy agency, others say moves that drastic would hurt national security.
There's a new version of the Payment Card Industry standard for network security -- PCI 3.0 – out today from the group overseeing its publication, the PCI Security Standards Council.
Sophos today leapt forward with a cloud strategy under which it will deliver integrated management and policy enforcement for its endpoint security software and unified threat management (UTM) firewall through a cloud-based console for both its enterprise customers and industry partners.
An alarming growth in malware signed with fraudulently obtained keys and code-signing certificates in order to trick users to download harmful code is prompting Microsoft and Symantec to push for tighter controls in the way the world's certificate authorities issue these keys used in code-signing.
The Identity Theft Resource Center has recorded 450 data breaches so far this year, and here are the worst that become known between July and September
McAfee research indicates that a steep rise in the amount of malware signed with legitimate digital certificates -- not forged or stolen ones -- is a growing threat that raises the question whether there should be some kind of "certificate reputation services" or other method to stop certificate abuse.