Dropping prices, fast processing speeds and more user-friendly designs have given a boost to this highly accurate biometric technology.
Microsoft's board of directors wants to wrap up its search for a new CEO before the end of the year, according to Bloomberg, citing anonymous sources close to the action.
At the entrance to The Vault, the most secure room within the most protected building operated by security services provider, Symantec, an iris recognition system stands guard as the last line of defense.
Sure, you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes.
Applying Big Data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this week.
Sure you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes. Insider (registration required)
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Depending on whom you ask, paying for antivirus software is either a good investment or a total ripoff. In reality, neither viewpoint is accurate. You can find plenty of good reasons to choose a paid antivirus product, and plenty of good reasons to go with a freebie.
Security vendor Symantec is using new virtual machine technology to protect Web surfers from online attack.
An online underground economy has recently matured into an efficient, global marketplace to trade stolen goods and offer fraud-related services.
Sign up now »
The purpose of this paper is to consider the value of a solid state hybrid drive (SSHD) for enterprise applications. An SSHD is a hybrid storage device that combines a traditional magnetic disk drive and complementary solid state storage to achieve a blend of high capacity and high performance for hot (frequently read) data.
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
- NSA taps tracking cookies used by Google, others, to monitor surveillance targets
- Security tactics might have helped in foreign ministry hacks
- Many organisations lack DDoS response plan, Corero finds
- Brace for change: An interview with Tony Hayes of ISACA
- Adobe patches critical vulnerabilities in Flash Player, Shockwave
- Facebook performance report signals rising brand engagement on social
- Australia's love of online search advertising continues, finds new report
- Why Shazam is helping advertisers hit the right tune with consumers
- Twitter, the protector of news?
- B2B customers are increasingly led by consumer habits and experience