Recent hacks expose personal information about millions of people.
- By Alison May
- Aug 06, 2015
Windows 10 features a number of security updates and settings that are important to know, even if you didn’t read the fine print.
- By Matt Holden
- Aug 05, 2015
Some public Wi-Fi hotspots are provided by con artists.
- By Matt Holden
- Aug 04, 2015
Intersecting business into the professionalization of information security debate.
- By Martin Zinaich
- Aug 04, 2015
The funding was led by TPG Growth.
- By Matt Holden
- Aug 03, 2015
5 steps to help professionalize the cybersecurity workforce.
- By Martin Zinaich
- Aug 03, 2015
Five key areas of understanding for information security directors.
- By Martin Zinaich
- Jul 31, 2015
Breaches of all sizes - small, medium and large - ruin reputations and can cost millions of dollars.
- By Martin Zinaich
- Jul 30, 2015
Bolting on security after the fact is always more costly, time consuming and less effective.
- By Martin Zinaich
- Jul 29, 2015
The devices can be hacked using a simple MMS message.
- By Matt Holden
- Jul 28, 2015
International Information Systems Security Certification Consortium of 1988 formed among several professional organizations to create a global information security certification process for professionals and address the need for standardized curriculum.
- By Martin Zinaich
- Jul 20, 2015
What does information security have in common with Eastern Air Lines Flight 401? It’s an odd question, with an important — and potentially tragic — answer.
- By Martin Zinaich
- Jul 15, 2015
Partnership will expand reach for Code Dx's software vulnerability management system to Europe.
Mozilla also disabled the web-enabled video software.
- By Matt Holden
- Jul 15, 2015
Credit monitoring and identity-theft protection offered to those affected.
- By Ginger Hill
- Jul 10, 2015
Take into consideration the hackers' motivation, then develop a plan of action.
- By Ginger Hill
- Jul 09, 2015
Increasing mobility of equipment raises new concerns of managing access and keeping data confidential.
- By Steve Spatig
- Jul 08, 2015
Flights were grounded nationwide due to a network connectivity issue.
- By Matt Holden
- Jul 08, 2015
The advantages of video surveillance are well known, but at times, the full value is realized only after a system is installed.
- By Francois Wolf
- Jul 01, 2015
The researcher known as Mudge plans to start a non-profit devoted to software security.
- By Matt Holden
- Jun 30, 2015