 
                    
                                        
		            
                    Leveraging artificial intelligence and machine learning allows organizations to enjoy real time protection and risk identification, significantly reducing security risks without the need to increase staff. 
                    
			            - By Santosh   Varughese
- Sep 23, 2016
 
            
    
                
	                 
                    
                                        
		            
                    A U.S. House committee issued a scathing report accusing Snowden of causing damage to U.S. security.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    The top iPhone features that guard your privacy and security.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Each of these four key components are essential in establishing a solid defense against would-be cyber-attacks. 
                    
			            - By Gabby  Nizri
- Jun 29, 2016
 
            
                
	                 
                    
                                        
		            
                    Intel could never make full use of the McAfee business, which it bought in 2010.
                    
			            - By Sydny  Shepard
- Jun 27, 2016
 
            
                
	                 
                    
                                        
		            
                    DDoS attack prevention is nearly impossible: it’s difficult to track down hackers, whereas it’s easy and inexpensive to launch a DDoS attack. 
                    
			            - By Dave  Larson
- Jun 24, 2016
 
            
                
	                 
                    
                                        
		            
                    Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.
                    
			            - By Sydny  Shepard
- Jun 23, 2016
 
            
                
	                 
                    
                                        
		            
                    A security firm analyzed open security cameras and concluded which U.S. cities have the most unsecured cameras in use.
                    
			            - By Sydny  Shepard
- Jun 22, 2016
 
            
                
	                 
                    
                                        
		            
                    Acer has admitted to a data breach that affects more than 30,000 customers. 
                    
			            - By Sydny  Shepard
- Jun 20, 2016
 
            
                
	                 
                    
                                        
		            
                    While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.
                    
			            - By Eric  Aarrestad
- Jun 20, 2016
 
            
                
	                 
                    
                                        
		            
                    The NFL has hired cybersecurity firm, K2 Intelligence, to help teach players how to use social media.
                    
			            - By Sydny  Shepard
- Jun 16, 2016
 
            
                
	                 
                    
                                        
		            
                    In the week following the murder-suicide that happened on UCLA’s campus, safety officials have created a task force to deal with security issues.
                    
			            - By Sydny  Shepard
- Jun 13, 2016
 
            
                
	                 
                    
                                        
		            
                    If your password for the social media platform, Twitter, is 123456 then you might need to change things up a little bit. 
                    
			            - By Sydny  Shepard
- Jun 10, 2016
 
            
                
	                 
                    
                                        
		            
                    A security firm was able to hack into Mitsubishi Outlander PHEV through its mobile app and disable the theft alarm. 
                    
			            - By Sydny  Shepard
- Jun 08, 2016
 
            
                
	                 
                    
                                        
		            
                    A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.
                    
			            - By Sydny  Shepard
- Jun 07, 2016
 
            
                
	                 
                    
                                        
		            
                    Records show that the Federal Reserve has suffered through over 50 cybersecurity breaches in less than four years.
                    
			            - By Sydny  Shepard
- Jun 02, 2016
 
            
                
	                 
                    
                                        
		            
                    Hundreds of millions of hacked account details from social media networks such as MySpace and Tumblr have been advertised for sale online. 
                    
			            - By Sydny  Shepard
- Jun 01, 2016
 
            
                
	                 
                    
                                        
		            
                    The cyber attack was designed to give hackers remote access to the facilities.
                    
			            - By Sydny  Shepard
- Apr 27, 2016
 
            
                
	                 
                    
                                        
		            
                    A computer-security firm has raised concerns over the campaign apps of presidential candidates Ted Cruz and John Kasich. 
                    
			            - By Sydny  Shepard
- Apr 26, 2016
 
            
                
	                 
                    
                                        
		            
                    Gartner predicts worldwide security spending on the Internet of Things to reach high amounts this year.
                    
			            - By Sydny  Shepard
- Apr 26, 2016