IT security is attracting VC funding despite the recession, but in that competitive market, the watchwords are “innovate or die,” experts say.
|
Security startup snags funding in a tough market. But problems predate this recession as VC excitement for security has nosedived since 2000.
|
Security software firm taps $1.1B cash position to move further into enterprise and cloud.
|
Israeli digital rights management firm balks at buyout bid by San Francisco private equity firm.
|
Creator of SNORT open-source security program, backed by Sequoia, rejects $187.4M takeover by another Sequoia firm
|
Security specialists point to potential risks from phones developed from Google's Android and in Apple's plans to open its software platform to third party developers.
|
Network security firm acquires packet inspection firm in long-rumored deal for an estimated purchase price of about $150M.
|
The Facebook Beacon flap suggests that consumers need clear rules about what information about them is being shared.
|
VoIP device maker, which sells its gear to carriers, will use the new cash infusion to market its wares to large businesses.
|
I use Gmail, Google Search, Google Maps, Google Docs ... why do I feel like Google is closing in on me?
|
As fraudsters become better organized and more resourceful, online businesses are looking beyond law enforcement for help, and security startups are reaping the rewards.
|
The world's largest technology services company on Thursday says it plans to spend a record $1.5 billion next year to develop and market security products.
|
Once considered a commodity, security startups are still drawing big bucks two years into the market’s consolidation.
|
VoIP security firm gets new funding as investors stay the course with a turbulent Internet phone market.
|
New York Attorney General Andrew Cuomo slaps Facebook with a subpoena, saying his office is launching an investigation into weak protections against sexual predators on the social network.
|
China will send out two virtual police officers to patrol the Internet to combat online pornography and other illicit activity.
|
California woman accused of running Washington prostitution ring turns to little-known search analysis firm in hopes of drumming up more client names.
|
Instead of designing security software to run on Microsoft's Windows or another OS, companies are building system that can directly interact with Intel chips.
|
Britain launched on Thursday the selection process to choose companies to run its multi-billion pound national identity card scheme, the world's most ambitious biometric project.
|
Online auction giant tries to solve rampant problem of password thieves.
|
Page
1
of
16
|