During the Mason-IBM-NSF conference in April 2015, experts had several insightful discussions regarding cybersecurity and industrial control systems.
Smart TVs are a soft entry point for those intent on cybercrime, especially attackers who prey on a user's ignorance of IT security practices.
Need a gift for the tech lover in your life? Take a look at some of the best — and worst — connected devices for the security savvy.
Take a look at the 10 most popular application security testing blogs from Security Intelligence in 2015 to learn something for the year ahead.
Ethereum is an updated blockchain technology that could be well-suited for the IoT. But how does it work, and is it a capable solution?
Researchers have again defeated the Algebraic Eraser, used to encrypt devices on the Internet of Things. Is security impossible on the IoT?
The most effective endpoint security solution needs to have both content and context in order to help professionals remediate problems.
Here are 10 collaborative resources, including webinars, blogs, white papers and reports, designed to help application protection practitioners.
What could be worse than having your identity stolen? How about having your personal health compromised by a cybercriminal who hacks a medical device?
Mobile devices and endpoints still remain the main gateways for wearables to interact with the wider IT environment, and all must be secured.