Security | News, how-tos, features, reviews, and videos
Keynote speaker Gen. Keith Alexander insists programs have checks and balances in place to prevent abuse
A military judge acquitted Bradley Manning of most serious charge but found him guilty of spilling secrets to WikiLeaks
MongoDB user access can now be controlled and managed by Red Hat Enterprise Linux's Identity Management package
Due to PRISM, non-U.S. firms are avoiding Stateside cloud providers, but government access to cloud data can't be stopped
The applications, which may contain just a link to a website, can be hard to assess using automated analysis
Uncle Sam is waging all-out war on whistleblowers, while those managing the exposed systems walk away without a scratch
A code of conduct for mobile app developers approved this week isn't enforceable, one critic says
Crypton is a framework that lets applications encrypt data in the browser before it is sent to a remote server
Security fearmongers say employees can't be trusted to keep corporate data safe outside the office -- so stop making them take it
Companies reported $300 million in losses from the five-year series of attacks