While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.
- By Eric Aarrestad
- Jun 20, 2016
The NFL has hired cybersecurity firm, K2 Intelligence, to help teach players how to use social media.
- By Sydny Shepard
- Jun 16, 2016
In the week following the murder-suicide that happened on UCLA’s campus, safety officials have created a task force to deal with security issues.
- By Sydny Shepard
- Jun 13, 2016
If your password for the social media platform, Twitter, is 123456 then you might need to change things up a little bit.
- By Sydny Shepard
- Jun 10, 2016
A security firm was able to hack into Mitsubishi Outlander PHEV through its mobile app and disable the theft alarm.
- By Sydny Shepard
- Jun 08, 2016
A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.
- By Sydny Shepard
- Jun 07, 2016
Records show that the Federal Reserve has suffered through over 50 cybersecurity breaches in less than four years.
- By Sydny Shepard
- Jun 02, 2016
Hundreds of millions of hacked account details from social media networks such as MySpace and Tumblr have been advertised for sale online.
- By Sydny Shepard
- Jun 01, 2016
The cyber attack was designed to give hackers remote access to the facilities.
- By Sydny Shepard
- Apr 27, 2016
A computer-security firm has raised concerns over the campaign apps of presidential candidates Ted Cruz and John Kasich.
- By Sydny Shepard
- Apr 26, 2016
Gartner predicts worldwide security spending on the Internet of Things to reach high amounts this year.
- By Sydny Shepard
- Apr 26, 2016
The FBI was finally able to extract the data from the San Bernardino attacker’s iPhone, but was it worth the price?
- By Sydny Shepard
- Apr 22, 2016
Visa is working on a solution to trim seconds off the time it takes to purchase something using the new chip-enabled credit cards.
- By Sydny Shepard
- Apr 20, 2016
The United States and Russia are meeting to discuss cybersecurity, and hopefully prevent a cyber war.
- By Sydny Shepard
- Apr 18, 2016
Based on research done by Intel Security, there is a c-level blind spot when it comes to the vulnerabilities of the cloud.
- By Sydny Shepard
- Apr 14, 2016
Fans of the college basketball tournament, March Madness, may need to pay special attention to the information they shared on the CBS Sports app and website during the popular event.
- By Sydny Shepard
- Apr 13, 2016
Messaging app, WhatsApp, has made a move to encrypt all messages sent and received on their platform.
- By Sydny Shepard
- Apr 06, 2016
The Panama Papers, recently leaked by an anonymous source, is the biggest data breach in history.
- By Sydny Shepard
- Apr 04, 2016
There going to be a ton of new products at this year’s ISC West show, especially internet driven devices.
- By Sydny Shepard
- Apr 04, 2016
When it comes to cybersecurity the world falls into two camps: those focused on securing their hardware and applications as a closed system, and those who recognize that converging technologies calls for a more ecosystem-centric approach.
- By Vince Ricco
- Apr 01, 2016