
Security Startups Become Hot Acquisiton Targets
Security startups have become hot acquisition targets for bigger companies that are trying to protect themselves or their customers from
Security startups have become hot acquisition targets for bigger companies that are trying to protect themselves or their customers from
Imagine a nefarious computer virus, one some industry experts say may bethe most sophisticated piece of malware ever written. Imagine
When HM Revenue & Customs revealed in November 2007 that it had lost 25 million records, the profile of data
Do you know what’s running on your website? A new report from security firm Dasient concludes that the majority of
Not all types of static-analysis tools are looking for the same types of software defects. Some defects affect overall code
Numerous security tools on the market today perform static analysis, penetration testing and security audits on application code that has
SANTA CLARA, Calif. — As the federal government pours billions of dollars into utilities and companies that promise to create
Most companies do a poor job of handling cybersecurity, even as their losses to cybercrime continue to mount, according to
If you’ve always wondered what a smart card is, here’s how to think about it: a smart card, used for