Security News



90 percent of data loss prevention (DLP) violations occur in cloud storage apps, and a large percentage of these are for enterprise confidential intellectual property or customer or regulated data tha...


Users are resigned to the loss of privacy, but not because they feel they are getting good value for their data, but because they believe marketers will eventually get it anyway, a new study by Univer...

Among the improvements that Apple announced for iOS 9 on Monday, there are some security enhancements as well. The most important one is the switch from 4-digit to 6-digit passcodes, which makes th...

IT security and IT leaders and their staff members do not agree on security objectives, according to findings from a new global Ponemon study. One of the key findings from the study was that more t...


John Matherly's Shodan, a search engine that finds Internet-connected devices, can be used for many things: gauging the impact of policies and network security efforts (e.g. patching), finding malware...

After a great deal of debate and delay, the Federal Information Security Management Act (FISMA) finally saw a substantive update in December 2014. For federal agencies and the businesses that contract...