IoT, with its tiny screens & headless devices, will drive an authentication revolution. It's a short leap from the kind of two-factor authentication used on the Apple Watch to proximity-based authentication that does away with any user interacti...
Recent high-profile vulnerabilities have put the lie to the 'many eyes' theory -- but also driven real progress in securing the open source ecosystem
A Ponemon survey of more than 2,000 IT pros finds increased reliance on and fading faith in Public Key encryption.
Experts say that the cyber insurance market is still young and, when it comes to insuring against cyber attacks, do your homework
Apple's embrace of finger scanning technology in the iPhone could be a breakthrough moment for biometrics. But finger scanners are no panacea. Here are 7 ways hackers have figured out to fool them.