Open source unleashes blockchain's enterprise potential
Move over, bitcoin -- the Linux Foundation has big plans for an open distributed ledger system to track and record all sorts of transactions beyond currencies
Move over, bitcoin -- the Linux Foundation has big plans for an open distributed ledger system to track and record all sorts of transactions beyond currencies
Thanks to technical advances and increased adoption, securing your data and communications is a lot easier than you might think
Do as I say, not as I do: Admin mistakes often surpass the severity of those made by users. Here are 10 of the most common -- and their remedies
Do you like audio and video on your Android device? They lie at the heart of recent vulnerabilities in Google's latest security update
Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all
Some products will be replaced, but admins will need to start over for setup and configuration
The bad news: Java and Oracle's database products had lots of vulnerabilities. The good news: None are currently under attack
A survey of major industries reveals health care organizations are below average in secure coding
The latest zero-day vulnerability in Flash Player is currently under attack by Pawn Storm. Sit tight for an emergency patch next week
Google Apps administrators now can use single sign on for a wider set of Web and mobile apps
Hackers create fictional people on LinkedIn to engage in industrial espionage and social engineering attacks
Two new Amazon cloud products proactively deal with security issues before they become security and compliance problems
Why spend time targeting Active Directory for domain credentials when Outlook Web Application is just as good -- and far easier to compromise?
Most merchants now have EMV credit card readers in place, yielding marginally improved security today -- and a platform for better payment systems arriving soon
GitHub developers will now be able to log in to the code repository using YubiKey hardware keys