Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.
                    
			            - By Ginger  Hill
 - Jun 12, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.
                    
			            - By Ginger  Hill
 - Jun 11, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Parents of school children are standing up against Big Data when it comes to their children's personal information.
                    
			            - By Ginger  Hill
 - Jun 09, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Ways to make yourself a hard target by recognizing online vulnerabilities and ways to strengthen your defenses.
                    
			            - By Ginger  Hill
 - Jun 05, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Vodafone Romania and furniture retailer MobExpert merge the physical and digital world of reading, encouraging the use of mobile data.
                    
			            - By Ginger  Hill
 - Jun 04, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Streamlining the process to ensure a smooth transition whether a full-scale migration or just moving small amounts of data.
                    
			            - By Sara   Gates
 - May 30, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Understanding the difference and likenesses between data privacy, information security and confidentiality provides a rich tool set to protect information as long as the proper protection paradigm is applied.
                    
			            - By Michelle   Dennedy , Jonathan   Fox , Thomas  Finneran 
 - May 23, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Long-winded privacy policies create confusion and frustration for Internet consumers. 
                    
			            - By Ginger  Hill
 - May 22, 2014
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    eBay officials urging all 112 million users to change their passwords immediately to help rectify recently-discovered breach.
                    
			            - By Ginger  Hill
 - May 21, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A pioneer in the biometric industry is worried about what he's seeing take place with this technology, specifically facial recognition. 
                    
			            - By Ginger  Hill
 - May 19, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Gallagher Security, a global leader in the design and manufacture of innovative access control, intruder alarm and perimeter security systems, highlight its latest FIPS 201-2 compliant solution at GovSec 2014.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Baby Boomers have created a "booming" home health care industry, expected to reach $150.8 billion by 2018, giving rise to reimbursement fraud.
                    
			            - By Mark  Robinton
 - May 15, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Identity management company innovates with a REST API for directories - now available for download.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
                    
			            - By Eileen   Turner
 - Apr 25, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.
                    
			            - By Yishay  Yovel
 - Apr 18, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Protect your digital life with this checklist of must-do security tasks. 
                    
			            - By Ginger  Hill
 - Apr 17, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A short but close look at the murder of the password by biometrics, from the mainframe to the smartphone. 
                    
			            - By Ginger  Hill
 - Apr 16, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    By 2015 Next Generation Identification (NGI) will have millions of stored facial images.
                    
			            - By Ginger  Hill
 - Apr 15, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    When selecting a payment processor be sure to select one that has these characteristics to maintain secure data integrity.
                    
			            - By Avery  Buffington
 - Apr 09, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    According to Saddleback College Chief of Police, Christopher Wilkinson, the childcare center in particular was a top priority due to concerns related to the Sandy Hook Elementary tragedy and other similar violent incidents. 
                    
			            - By Domingo  Martinez
 - Apr 01, 2014