Security News






Cybersecurity has clearly become an important board-level priority. In fact, more than 80 percent of respondents to a NYSE Governance Services/Veracode survey reported that cybersecurity is discussed ...

Companies are putting their customers’ data at risk because IT teams do not have the expertise or time to deploy today’s complicated IT security products, a new survey from Lieberman Software revealed...

Over time, the fundamental functions your firewall executed have been nullified by the very traffic they were meant to control. Applications evolved to where the firewall, the core of your security in...

Another drone was discovered flying in restricted air space around the White House two weeks ago. The Secret Service found the pilot simply because they happened to see him. In other words, there i...

The number of domain names used for phishing reached an all-time high, according to a new report by the the Anti-Phishing Working Group (APWG). Many of these were registered by Chinese phishers, who r...