Using geolocation data, the credit card company proposes a plan that will only allow card transactions when a users' smartphone is within close proximity.
HP will focus its efforts on security services, security management integration, data security and the intersection of security and corporate governance.
q&a Taher Elgamals, an inventor of the Secure Sockets Layer protocol, explains what needs to be done to boost security on the Internet. Hint: browser improvements.
Federal and international regulators suggest they may have to re-examine privacy and security standards to take into account cloud computing.
Safer, chip-enabled credit cards are coming to the US before the end of 2015, but it will be years before tougher, PIN-based security will be used nationwide.
RSA chief scientist Ari Juels explains why classical literature has a place in IT security, and what to make of security in radio frequency identification.
From Target to Home Depot to JPMorgan, this year was a bad one for massive security breaches. Expect more of the same next year.
The fingerprint reader on the iPhone 6 can be fooled by the same trick that unlocks the iPhone 5S -- but it didn't have to be that way.
You don't have to be an online security expert to know that usernames and passwords are not cutting it. It's time to completely re-think how we manage our online identities.