Security | News, how-tos, features, reviews, and videos
Splunk is seeking to make it easier than ever to use statistical analysis on your machine-generated data to automate the identification of anomalies and outliers in your systems.
IT departments can keep employees from using malware-infested mobile apps by creating an internal store of company-approved apps. The store can also collect feedback from users about their preferences.
Today's complex IT environments make maintaining 'always on' availability more challenging than ever before, even as IT has become central to most business operations. IDC's David Tapper says organizations must adopt a plan for ac
The Electronic Communications Privacy Act reform bill advances to the Senate floor to better protect email privacy. Meanwhile a House subcommittee considers privacy protections for location data, data which some in law enforcement say is necessary to
The mainframe remains the backbone for countless organizations, as modernization efforts bring new technologies into the fold, business leaders are taking steps to ensure mission-critical systems remain secure.
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
Digital Advertising Alliance head slams Microsoft, Mozilla for derailing do-not-track work, while Mozilla rep counters that ad networks have been ignoring customer preferences.n
Healthcare providers were among the first industries to use tablets and other mobile devices, but leveraging them fully has been difficult due to regulations that protect electronic health records and other personal health information. But enterprise
Following Tuesday's hacking of the Associated Press' Twitter account, the microblogging site is reportedly working on a two-step authentication security solution to help prevent future hijackings.
The Associated Press's Twitter account was hijacked this afternoon and used to tweet a false message that reported two explosions at the White House had left U.S. President Barack Obama injured. One security expert says the incident underscores
An attack Google attributed to Chinese targeting human-rights activists was actually a case of hackers probing U.S. surveillance on undercover agents, according to the senior director of Microsoft's Institute for Advanced Technology
Sponsored Links