Websense will intro a new appliance specifically targeted at security threats from applications like Facebook, mash-ups and widgets. Why the volume of user-generated content means a different approach to security
A network of computer hackers caused an estimated $45 million in damages by turning thousands of computers into zombie machines, law enforcement officials say. Sophos searches for IT security lessons
The average medieval castle featured layers of defence. Multiple wall rings were constructed so that there was no single intrusion point. However, these walls could be rendered useless by that most unpredictable of enemies: the insider
Privacy and security issues have been hearty, if time-consuming, policy dishes at the dinner table of the Lac Carling Congress since its inception. They also figure in the menu of the Public Sector Chief Information Officers Council. Indeed many conferences and learned committees link privacy and security together, and with good reason. Though the two are very different, they have much in common.
As expected, a controversial scientific paper that describes how to disable security technology for digital audio files was publicly presented for the first time on Wednesday evening at the USENIX Security Symposium held in Washington D.C.
Many network technologies have held the promise of revolutionizing and replacing existing wares. So it was with IP Security (IPSec), a virtual private network (VPN) security technology with integrated support for shared secret key and digital certificate authentication.