It's not just years that leap. We've take a taken a look at the leap technology has made since the…
Get your head around these IT security terms and you're well on your way to protecting your company, says Laurance…
Health Secretary Jeremy Hunt outlines £4.2bn of funding to help transform the NHS
Consultant working for government claims energy companies ignored their own security rules in power grid hack, as more attacks are…
Eva Chen, the CEO of TrendMicro, discusses her plans for tackling the next generation of IT challenges
Two years after giving it up to be a community project, Mozilla is now shutting its Persona Web authentication operations…
Former defence secretary Liam Fox also calls for new government investment in cybersecurity protection
"The internet is inherently insecure and the attack surface is increasing," warns Equinix in House of Commons meeting
Leading tech firms will be forced to report major cyber attacks under new European cybersecurity laws
Amazon emails number of users advising password reset because of "improper" storage
Taxpayers foot multimillion pound GCHQ bill for better protecting the UK in cyberspace
Intel discusses its approach to cloud security in an effort that makes use of software-defined networking technology to segment and…
Tech firms voice opposition to US bill amid concerns about data privacy and ‘collateral damage’ to third parties
Xi Jinping presses the flesh with US tech bosses, promises reform
Palo Alto Networks eyes rise to the top with 2015 billings growing 58 percent year-over-year
Dropbox now supports USB U2F two factor authentication to protect users from phishing during the login process
Lenovo firmware on laptop motherboards was not only irremovable but also posed a security risk
Adobe's August Patch Tuesday update provides fixes for 34 identified Common Vulnerabilities and Exposures (CVEs)
Search engines, social networks and e-commerce websites will have to comply with EU security measures
The single most pervasive zero-day is use-after-free (UAF), but new research from HP detailed at Black Hat could change that…
At the Black Hat show, a security expert demonstrates how vulnerable SDN switches that use the ONIE software are open…
Google's bring your own keys program marries cost benefits of public cloud computing with robust encryption security, the company says
On-premise cyber security platform will feature social media-style timeline and use machine learning to outwit the hackers
Cyber-security firm backed by former Autonomy boss Mike Lynch hits new high
Google publishes open letter to the US Bureau of Industry and Security objecting restrictions slapped on the export of cybersecurity…
Hardware for attacking computers via Wi-Fi caught the attention of a Boeing defense subsidiary, which wanted to use its drones…
Microsoft moves to buy Israeli cloud security firm for £205m
Upgrade now or face being overrun by criminals with more advanced tools, RAND report warns businesses
BAE Systems Applied Intelligence announces cloud-based cyber security tools for commercial organisations
It's good to talk - IBM initiative aims to help companies share their cyber security experiences