Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.
- By Ginger Hill
- Jun 11, 2014
Parents of school children are standing up against Big Data when it comes to their children's personal information.
- By Ginger Hill
- Jun 09, 2014
Ways to make yourself a hard target by recognizing online vulnerabilities and ways to strengthen your defenses.
- By Ginger Hill
- Jun 05, 2014
Vodafone Romania and furniture retailer MobExpert merge the physical and digital world of reading, encouraging the use of mobile data.
- By Ginger Hill
- Jun 04, 2014
Streamlining the process to ensure a smooth transition whether a full-scale migration or just moving small amounts of data.
- By Sara Gates
- May 30, 2014
Understanding the difference and likenesses between data privacy, information security and confidentiality provides a rich tool set to protect information as long as the proper protection paradigm is applied.
- By Michelle Dennedy , Jonathan Fox , Thomas Finneran
- May 23, 2014
Long-winded privacy policies create confusion and frustration for Internet consumers.
- By Ginger Hill
- May 22, 2014
eBay officials urging all 112 million users to change their passwords immediately to help rectify recently-discovered breach.
- By Ginger Hill
- May 21, 2014
A pioneer in the biometric industry is worried about what he's seeing take place with this technology, specifically facial recognition.
- By Ginger Hill
- May 19, 2014
Gallagher Security, a global leader in the design and manufacture of innovative access control, intruder alarm and perimeter security systems, highlight its latest FIPS 201-2 compliant solution at GovSec 2014.
Baby Boomers have created a "booming" home health care industry, expected to reach $150.8 billion by 2018, giving rise to reimbursement fraud.
- By Mark Robinton
- May 15, 2014
Identity management company innovates with a REST API for directories - now available for download.
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
- By Eileen Turner
- Apr 25, 2014
To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.
- By Yishay Yovel
- Apr 18, 2014
Protect your digital life with this checklist of must-do security tasks.
- By Ginger Hill
- Apr 17, 2014
A short but close look at the murder of the password by biometrics, from the mainframe to the smartphone.
- By Ginger Hill
- Apr 16, 2014
By 2015 Next Generation Identification (NGI) will have millions of stored facial images.
- By Ginger Hill
- Apr 15, 2014
When selecting a payment processor be sure to select one that has these characteristics to maintain secure data integrity.
- By Avery Buffington
- Apr 09, 2014
According to Saddleback College Chief of Police, Christopher Wilkinson, the childcare center in particular was a top priority due to concerns related to the Sandy Hook Elementary tragedy and other similar violent incidents.
- By Domingo Martinez
- Apr 01, 2014
When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.
- By Sumeet Sabharwal
- Apr 01, 2014