Skip Links

Security Research Center

Your source for network security news, opinion, product comparisons and reviews.

Jon Oltsik

IBM Is Focused on Burgeoning Enterprise Security Requirements

Recent Security posts | Security Posts Archive

  • Large Organizations Need Open Security Intelligence Standards and Technologies
  • The security industry remains strong with computer science, but weak on IT
  • Apple’s iPhone 5s Touch ID: A Game Changer
  • Information Security versus “Shadow IT” (and mobility, cloud computing, BYOD, etc.)
Security Blogs
  • Ms. Smith Privacy and Security Fanatic
    Ms Smith

    LG Smart TV spying whiplash: LG removes Smart Ad video and changes statement

    Brace yourself to avoid whiplash as LG released an official statement about LG Smart TV spying, then changed it on the privacy policy and removed LG Smart Ad video.

    Security Case Studies
    • How one municipality is securing, managing Google Apps, Docs
    • FedEx says tracking system "back to normal" after software glitch
    • AirTran: Virtualization requires network visibility
    Security News
    • Why security benefits boost mid-market adoption of virtualization

      While virtualization has undoubtedly already found its footing in larger businesses and data...

    • Small Businesses Put Themselves at Risk by Not Taking Security Seriously

      Senior management at small and mid-size businesses (SMBs) are failing to take cyber security...

    • Top signs that you've been breached

      Because data is often the most valuable corporate asset - especially when customer information is...

    • Why we are losing the cyber security war and what we can do about it

      Why are the world’s most IT savvy companies unable to keep attackers out of their networks?

    • Trojan program 'Neverquest' a new threat to online banking users, researchers say

      A new Trojan program that targets users of online financial services has the potential to spread...

    • Malware: War without end

      Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the...

    • Study: Companies are not as secure as they think

      CompTIA, the nonprofit association for the IT industry, has a warning for companies: You are likely...

    • Google hit with privacy complaints in 14 EU countries

      Google was hit by privacy complaints in 14 E.U. countries Tuesday over its new terms of service...

    • Crimeware kit includes Bitcoin, Litecoin miner module

      A new malicious software program, advertised for sale on underground forums, claims to mine and...

    • 'Blackshades' malware still being sold, Symantec says

      Cybercriminals are increasingly using the "Blackshades" malware program whose source code...

    • Big Data offers means to combat health care hacker attacks

      Despite the aggressive efforts of government regulators, the health care industry's reputation...

    • Vermont discloses data breach on healthcare exchange website

      Despite warnings and concerns over the fact that websites used to manage the nation's...

    • Million-dollar robbery rocks Bitcoin exchange

      Bitcoin Internet Payment Services, a Denmark-based exchange billing itself as Europe's biggest, was...

    • NSA spreading malware to further goals for more power

      Over the weekend, NRC Handelsblad, a Dutch newspaper, reported that the NSA has infected more than...

    • Twitter implements perfect forward secrecy in order to reduce traffic snooping

      Twitter has implemented perfect forward secrecy on traffic to its website, in order to prevent...

    • View more Security News

    Clear Choice Tests

    See more Tests