Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?
- By Ginger Hill
- Jun 10, 2014
Parents of school children are standing up against Big Data when it comes to their children's personal information.
- By Ginger Hill
- Jun 09, 2014
Ways to make yourself a hard target by recognizing online vulnerabilities and ways to strengthen your defenses.
- By Ginger Hill
- Jun 05, 2014
China's People's Daily, a state-operated media outlet, promises punishments as translated by Reuters.
- By Ginger Hill
- Jun 04, 2014
Vodafone Romania and furniture retailer MobExpert merge the physical and digital world of reading, encouraging the use of mobile data.
- By Ginger Hill
- Jun 04, 2014
Charges flied in Pennsylvania, marking the first time criminal charges have been filed against known state actors for hacking.
- By Ralph C. Jensen
- May 30, 2014
Streamlining the process to ensure a smooth transition whether a full-scale migration or just moving small amounts of data.
- By Sara Gates
- May 30, 2014
Long-winded privacy policies create confusion and frustration for Internet consumers.
- By Ginger Hill
- May 22, 2014
eBay officials urging all 112 million users to change their passwords immediately to help rectify recently-discovered breach.
- By Ginger Hill
- May 21, 2014
Law enforcement officials from around the globe ban together in hopes of at least putting a dent into this global threat.
- By Ginger Hill
- May 19, 2014
Engaging on Twitter leads to discover of app to help parents keep their children safe via open communication and allowing the child to be an advocate for their own safety.
- By Ginger Hill
- May 01, 2014
ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.
- By Ralph C. Jensen
- May 01, 2014
Heartbleed scanner identifies over 1,700 vulnerable mobile apps.
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
- By Eileen Turner
- Apr 25, 2014
"We are extremely proud of Leo and the incredible amount of time and effort he provides in support of our service men and women. His devotion to helping them transition from military life to professional civilian careers exemplifies our recognition of American freedoms and opportunities," said Daniel Krantz, CEO of Real-Time Technology Group.
To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.
- By Yishay Yovel
- Apr 18, 2014
Protect your digital life with this checklist of must-do security tasks.
- By Ginger Hill
- Apr 17, 2014
A short but close look at the murder of the password by biometrics, from the mainframe to the smartphone.
- By Ginger Hill
- Apr 16, 2014
Unique, event-based video discover platform coming to ISC West 2014.
Is this a violation of our Second Amendment right or is this responsible gun selling/ownership at it's best?
- By Ginger Hill
- Mar 06, 2014