Zama, an open-source cryptography company building state-of-the-art FHE solutions to protect privacy in blockchain and AI, today announced a €67 million
Microsoft will create a new software license to protect non-government organizations "from falling victim to nefarious actions taken in the guise of anti-piracy enforcement," the company said Monday.
China is stepping up efforts to keep the security systems that protect its critical infrastructure in the hands of local firms, and that could be bad news for companies based outside the country.
China is taking the issue of intellectual property rights "seriously" and is pledging with the U.S. to fight cybercrime, said U.S. Attorney General Eric Holder during his trip to Beijing
U.S. lawmakers questioned Wednesday whether the U.S. Department of Homeland Security has the authority or resources it needs to protect the nation against cyberattacks.
Executives in charge of information security should make friends with the CFO, who can give them a broad overview of corporate priorities and see to funding the most important IT projects that protect corporate data.
At the RSA Conference in San Francisco last week, security vendors pitched their next-generation of security products, promising to protect customers from security threats in the cloud and on mobile devices. But what went largely unsaid was that the industry has failed to protect paying customers from some of today's most pernicious threats.
When a security researcher late last year discovered Sony was using hidden software-cloaking and monitoring techniques to protect copyrights on its music CDs, public backlash prompted lawsuits against the company and a debate ensued about using "rootkits" in commercial software.
A mish-mash of security issues came up this week, everything from how to protect virtualized environments to a system that protects copper in utility sites from robbery and a story about digital certificate thefts.
A coalition of 10 U.S. privacy and consumer groups has called for new federal privacy protections for Web users, including a requirement that Web sites and advertising networks get opt-in permission from individuals within 24 hours of collecting personal data and tracking online habits.
CFOs need to understand more than the costs and financial benefits to adopting cloud and consumer technologies. They're also on the hook to protect against risk
A coalition of tech vendors and privacy groups is calling on the U.S. Congress to update a 24-year-old law to better protect users of e-mail, cloud computing services and mobile phones from government surveillance.
AT&T's failure to protect some iPad 3G user e-mail addresses highlights a range of security issues that enterprise IT groups should note as they roll out smartphone applications on mobile platforms such as iPhone and Android.