The Obama administration a breach on government workers could affect up to four million citizens.
                    
			            - By Matt  Holden
 - Jun 05, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Brings new ease, speed, efficiency to enterprise compliance and breach prevention.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Phone companies to retain data while NSA must get permission from federal court. 
                    
			            - By Ginger  Hill
 - Jun 03, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    No matter where you look in the retail sector today, the market seems to be in a perpetual state of transition when it comes to security. 
                    
			            - By Jumbi   Edulbehram
 - Jun 01, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Action steps people can take to make it more difficult for hackers.
                    
			            - By Ginger  Hill
 - May 28, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Company provides security features and tools to empower individual account users.
                    
			            - By Ginger  Hill
 - May 27, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IS Decisions launched ‘The Weakest Link: A user security game,' with the input of security experts and analysts.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Tallying the number of alerts and breaches doesn't tell the whole story.
                    
			            - By Ginger  Hill
 - May 26, 2015
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    A new research paper found that people often choose obvious answers that are easy for hackers to guess.
                    
			            - By Matt  Holden
 - May 22, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The airline will pay a maximum of one million miles to anyone who can prove a remote code execution.
                    
			            - By Matt  Holden
 - May 15, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Absolute Software report uncovers usage behavior and security risks of connected employees.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    MyID technology allows customers to sign and encrypt email from mobile devices securely using WorxMail.
 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Users who have auto-reload setup on their digital card might be vulnerable.
                    
			            - By Matt  Holden
 - May 13, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Close to half of cards featured contactless payment capability.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The hotel & casino says hackers may have access to information about credit and debit cards.
                    
			            - By Matt  Holden
 - May 05, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.
                    
			            - By Randy  Smith
 - May 01, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New offering provides consumers added protection against identity theft through bank account takeover and credit card application fraud alerts.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The 2015 edition of the DBIR provides insight into the state of cyber-security in 2014.
                    
			            - By Matt  Holden
 - Apr 22, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services. 
                    
			            - By Cale   Dowell
 - Apr 10, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    An official has stated that unclassified computers at the White House are vulnerable.
                    
			            - By Matt  Holden
 - Apr 08, 2015