This will be Jon Callas' third stint at the technology giant.
This will be Jon Callas' third stint at the technology giant.
Based in Mountain View, vArmour specializes in application-aware micro-segmentation to bring security analytics to data centers and cloud platforms.
16 percent of all accounts were already in the Have I Been Pwned database.
Founded in 2009, Agari perviously partnered with PayPal, Yahoo and Google to create the DMARC authentication protocol.
The FBI said it would retain the data to "aid in establishing patterns of activity" to help discover new criminals when they arise.
Google's 'Project Abacus' wants to replace passwords and pins with biometric logins -- and banks will do the initial testing soon.
International police and cybersecurity agencies tackle the row over strong encryption -- but their answer is likely to cause almost as many headaches as government-ordered backdoors.
Digital "swatting" has evolved into bomb and beheading threats made against schoolchildren.
The 18-year-old is believed to have been responsible for a DDoS attack and "swatting" users.
SWIFT says it plans to launch a new security program as it fights to rebuild its reputation in the wake of the $81 million Bangladesh Bank cyber heist.
The bipartisan duo said the advice comes after recent cyberattacks against Congress and a high-profile vulnerability in phone networks.
Hacker controlled botnets take their time to test which stolen credentials can give them access to multiple accounts to steal financial and personal data.
Graeme Hackland, IT director at Williams Martini Racing and Williams Advanced Engineering, tells ZDNet how the organisation works to avoid the nightmare scenario of getting hacked.
Two vulnerabilities in the photo-sharing service allowed hackers to brute-force their way into user accounts.
The sentence probably wasn't quite the reward he was looking for.
Take a plunge into the world of cybersecurity with these recommended reads.
What are the best five ways to stay safe online? Security professionals weigh in with these quick tips.
Using Adobe Flash can put your security and privacy at risk. Here's how to disable the plugin on Windows and Mac, and all major browsers.
Need a new book or two to read on the beach this summer? Check out our recommendations for technology fans.
From encrypted instant messengers to secure browsers, these security and privacy apps are some of the very best for protecting your devices.
From encrypted instant messengers to secure browsers and operating systems, these privacy-enhancing apps, extensions, and services can protect you both online and offline.
The first day of RSA 2015's exhibitor show floor was packed with booths and oodles of creative, sometimes bizarre, gimmicks to attract attention. These stand out from the rest.
With so many IT disasters occurring every day, it's hard to pick the worst of the worst, but here are some real standout foul-ups.
What are phishing campaigns, why do they exist and how do I protect myself?
What is malware, what does it do and how do I protect myself?
Follow these simple tips to make protecting your identity easier.
There are a lot of players in the mandatory data-retention debate. We look at who is for the legislation, and who is opposing it.
The Internet of Things opens up a world of possibilities for our connected lives. But what if a hacker could gain control of the things that mean the most to us. Here we investigate some possible hacking scenarios that could just happen.
Here are five ways to secure the data on your Mac using both built-in tools and third-party utilities. All of these are robust tools that can thwart both casual snoopers and hardcore hackers. And on top of that, they won't cost you a dime.
Your home router is vulnerable to attacks as soon as you take it out of the box. Here are a number of ways you can secure your home wireless network.
U.S. Deputy Secretary of Defense discusses need for industry and government collaboration to fight cyberthreats.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
Nokia's 6230i is an upgraded version of its classic, unpretentious 6230 with a higher quality screen, 1.3-megapixel camera and Bluetooth.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.
This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.
Motorola's music mobile combines a full-featured handset that will appeal to a wide range of users whether they're looking for fun, functionality or the perfect mixture of both.
Unique MailHurdle technology makes the RazorGate 100 stand out, but it's a little on the expensive side.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.