Brings new ease, speed, efficiency to enterprise compliance and breach prevention.
Phone companies to retain data while NSA must get permission from federal court.
- By Ginger Hill
- Jun 03, 2015
No matter where you look in the retail sector today, the market seems to be in a perpetual state of transition when it comes to security.
- By Jumbi Edulbehram
- Jun 01, 2015
Action steps people can take to make it more difficult for hackers.
- By Ginger Hill
- May 28, 2015
Company provides security features and tools to empower individual account users.
- By Ginger Hill
- May 27, 2015
IS Decisions launched ‘The Weakest Link: A user security game,' with the input of security experts and analysts.
Tallying the number of alerts and breaches doesn't tell the whole story.
- By Ginger Hill
- May 26, 2015
A new research paper found that people often choose obvious answers that are easy for hackers to guess.
- By Matt Holden
- May 22, 2015
The airline will pay a maximum of one million miles to anyone who can prove a remote code execution.
- By Matt Holden
- May 15, 2015
Absolute Software report uncovers usage behavior and security risks of connected employees.
MyID technology allows customers to sign and encrypt email from mobile devices securely using WorxMail.
Users who have auto-reload setup on their digital card might be vulnerable.
- By Matt Holden
- May 13, 2015
Close to half of cards featured contactless payment capability.
The hotel & casino says hackers may have access to information about credit and debit cards.
- By Matt Holden
- May 05, 2015
Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.
- By Randy Smith
- May 01, 2015
New offering provides consumers added protection against identity theft through bank account takeover and credit card application fraud alerts.
The 2015 edition of the DBIR provides insight into the state of cyber-security in 2014.
- By Matt Holden
- Apr 22, 2015
With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.
- By Cale Dowell
- Apr 10, 2015
An official has stated that unclassified computers at the White House are vulnerable.
- By Matt Holden
- Apr 08, 2015
Expanded BT200Z smart card reader includes support for Windows 8.1.