Security Topic Center
Get the latest news and in-depth analysis about IT security, including information about viruses and other malware, security patches, data protection and more
Security News
Former Qwest CEO out of prison, blames NSA for troubles
Revelations made by NSA leaker Edward Snowden would have given former Qwest CEO Joe Nacchio a fighting chance to beat insider-trading charges that garnered him a 70-month jail term, says Nacchio, who was released this month after serving four and a half years.
Read more...
Dell updates private cloud to become PCI compliant
Looking to solidify its refocused efforts on private cloud platforms, Dell today rolled out new features to improve security and manageability of its offerings.
Privacy group can's release Facebook response to its complaints
Campaign group Europe-v-Facebook received Facebook's response to complaints about the social networks' privacy policy on Tuesday, but was barred from publishing them by the Irish Data Protection Commissioner.
Shutdown could test IT security at federal agencies
A government shutdown that lasts more than a few days could test the ability of federal agencies to protect their information systems against security threats.
Intel to acquire network security firm Sensory Networks
Intel has signed a deal to acquire Sensory Networks, a provider of software pattern matching technology for network security applications.
Fake AdBlock Plus app removed from Google's Play store
Google has removed an application from its Play store that purported to be AdBlock Plus, a well-known application that blocks online ads.
Security company scours 'Dark Web' for stolen data
Alex Holden, founder of security company Hold Security, is in the business of bringing companies bad news.
Symantec seizes part of massive P2P botnet ZeroAccess
The cybercriminals behind ZeroAccess, one of the largest botnets in existence, have lost access to more than a quarter of the infected machines they controlled because of an operation executed by security researchers from Symantec.
Facebook widens Graph Search to include posts, status updates
Facebook has started to include more types of content in Graph Search, a tool for searching what others have been posting about on the social network
Tech firms push Congress for transparency on NSA surveillance
The U.S. Congress must act quickly on legislation that would make electronic data collection efforts by the U.S. National Security Agency more public, a group of tech firms, civil liberties groups and other organizations said Monday.
Security In Depth
7 sneak attacks used by today's most devious hackers
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
Forget fingerprints: Your iris is your new identity
Dropping prices, fast processing speeds and more user-friendly designs have given a boost to this highly accurate biometric technology.
7 characteristics of a secure mobile app
When it comes to building secure mobile applications, errors most often occur in session management. By themselves, these mistakes do not present a significant risk, but the more mistakes made, the more vulnerable the application. And therein lies the problem: I often find several of these errors in any given app.
Kenneth van Wyk: High hopes for iPhone's Touch ID
The iPhone 5S is the first smartphone with fingerprint authentication. It's not perfect, but it could herald a new emphasis on security for mobile devices.
How to Overcome Small Business Data Recovery Challenges
Data recovery has mattered ever since businesses started relying on PCs in the workplace. Today's common storage options for small businesses all present some disaster recovery challenges. Here's what your organization should do to address them.
7 Biggest IT Compliance Headaches and How CIOs Can Cure Them
IT, security and compliance experts discuss the biggest issues facing companies these days -- and what steps organizations can take to minimize potential regulatory compliance risks and security threats.
Jay Cline: What will Snowden leak next?
What if NSA leaker Edward Snowden hasn't been reckless but instead is following a carefully thought-out plan? If so, we can make some guesses about what revelations will come next.
'HoneyDocs' lays irresistible bait for hackers
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
Security Manager's Journal: Two big goals for 2014 budget won't require a lot of money
Hardening the core will leverage many existing technologies.
Steven J. Vaughan-Nichols: Does Windows 8 help the government to spy on us?
TPM has always sounded like a good idea. But the problem with 'trusted computing' has alwasy been knowing how trustworthy it is.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
Security White Papers
- The 10 "Must-Haves" for Secure Enterprise Mobility.
- A security framework and evaluators' checklist.
- Critical Capabilities for Mobile Device Management Software
- Gartner reviews critical capabilities, attributes that differentiate products in a class in terms of their quality and performance, for mobile device management.
- Embracing BYOD Through Secure App and Data Delivery
- Enterprise mobility management in the real world. BYOD isn't just a trend; it's an important new model for allowing people to choose the...
- Integrated Data Protection for VMware infrastructure
- This paper describes how Data Protector enables fast, efficient, and reliable protection for mission-critical data and applications in VMware vSphere and vCloud Director...
- Proxy Security Gateway -- The Right Tool for the Job
- Roofing and flooring contractor CentiMark uses a Blue Coat ProxySG security appliance to lock down its web traffic and streamline network management. Sometimes,... All Security White Papers
Security Webcasts
- Live Webcast Securing Mobile Devices with Citrix XenMobile MDM In this video, Chief Demo Officer, Brad Peterson provides a demo of how Citrix XenMobile MDM works.
- Live Webcast Secure Mobile Email Users Will Love Maintain full control over sensitive corporate data
- Secure Mobile Email Users Will Love Maintain full control over sensitive corporate data
- Securing Mobile Devices with Citrix XenMobile MDM In this video, Chief Demo Officer, Brad Peterson provides a demo of how Citrix XenMobile MDM works.
- Step Up to the IT Security Challenge Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- IBM Intelligent Investigation Manager: Online Product Demo Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more...
- All Security Webcasts