Are you getting the most from your network security? Here are five questions to help you determine whether you need a next-generation security solution.
A new version of Petya ransomware, called PetrWrap, has been spotted by security researchers. This Trojan leverages old tricks to make fast money.
Blockchain has the potential to revolutionize the way businesses conduct financial transactions in the next few years, according to security experts.
Researchers at Graz University of Technology in Austria developed a novel SGX malware attack that can extract an RSA key in under five minutes.
A new security flaw and fresh concerns about malware provide further evidence of the need for Android users to remain diligent to external risks.
It's critical to protect sensitive cloud-based data using encryption while it is being stored, and to delete it securely at the end of its life cycle.
Google just pushed its email encryption project, E2EMail, to open source. What does this mean for the development of corporate email security?
There are countless benefits to moving web infrastructure to support the HTTPS protocol, but it's not as simple as swapping one protocol for another.
Starting with the release of version 7.2 at the end of this year, the core of PHP will use Libsodium by default for routine cryptographical operations.
IoT security risks include physical, network, software and encryption attacks that target the sensor, network and application layers of IoT systems.