Google Takes Steps to Improve Gmail Security
By Sean Michael Kerner | Article Published December 18, 2014
Content Security Policy comes to Gmail as Google search considers flagging non SSL secured web sites.
Tags: Google, SSL, Email management, Security Breaches
Security, the Edward Snowden Way
By Mike Elgan | Article Published July 23, 2014
Security applications recommended by Edward Snowden – who probably knows as much about Internet privacy as anyone.
Tags: Security Software, Security Breaches, Edward Snowden
McAfee's Quarterly Insecurity Report: We’re Still in Trouble
By Rob Enderle | Article Published June 25, 2014
New research pinpoints the pain points -- and they're numerous.
Tags: McAfee, Mobile Device Security, Security Breaches
2014: The Year of Big Data Leaks
By Jeff Vance | Article Published January 06, 2014
Cybersecurity threats will grow still more worrisome as hackers leverage the techniques of Big Data.
Tags: Security Breaches, big data analytics, big data analysis
Nearly 80% of Enterprises Suffered a Mobile Security Incident in the Last Year
By Cynthia Harvey | Article Published June 06, 2013
Many of those incidents resulted in six-figure losses.
Tags: smartphone, survey, theft, BYOD, Security Breaches
BYOD, Data Loss Top List of Cloud Computing Challenges
By Pedro Hernandez | Article Published March 27, 2013
A study from AccelOps exposes some potential barriers to enterprise cloud adoption.
Tags: cloud computing, data loss, BYOD, Security Breaches
Report Ties Chinese Military to Cyberattacks
By Cynthia Harvey | Article Published February 19, 2013
Security firm Mandiant says the Chinese government is behind attacks on 140 different organizations, including 115 in the U.S.
Tags: China, government, cyberattack, report, Mandiant, Security Breaches
Anonymous Hacked the Fed
By Cynthia Harvey | Article Published February 07, 2013
The hacktivist group has published contact information for 4,000 bankers.
Tags: hack attacks, Anonymous, Security Breaches, hacktivist, Federal Reserve
What Are the Hidden Costs of Cloud Computing?
By Sean Michael Kerner | Article Published January 16, 2013
A Symantec report reveals that rogue cloud deployments are on the rise -- to a shocking degree.
Tags: cloud computing, Security Breaches
Twitter Breach Exposes 55,000 Accounts, Mostly Spambots
By Datamation Contributor | Article Published May 09, 2012
Twitter has reset the passwords for the affected accounts.
Tags: spam, Twitter, Security Breaches