Community Health Systems in Central Florida hospitals are affected by the breach
                    
			            - By Matt  Holden
 - Aug 20, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Internal investigation reveals three breaches in past three years, twice foreign related and once unidentifiable. 
                    
			            - By Ginger  Hill
 - Aug 19, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The product can be used on Windows, OS X, Android, and iOS
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Almost half of consumers would never use mobile payment and banking apps due to fears about the level of security on their devices, with suspicions highest in the over 55 age group.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Movie quotes offer great insights and knowledge to enhance the security industry.
                    
			            - By Ginger  Hill
 - Aug 13, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    
                    
			            - By Matt  Holden
 - Aug 12, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Two researchers planned to reveal their findings at Black Hat USA.
                    
			            - By Matt  Holden
 - Aug 08, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Breakthrough encryption and tokenization technologies deliver a new level of safety in today’s risk-prone, online transactional world.
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    The company says it has all the markings of a state-sponsored attack.
                    
			            - By Matt  Holden
 - Aug 07, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    4 ways to battle this social media giant to beat them at their own game.
                    
			            - By Ginger  Hill
 - Aug 06, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.
                    
			            - By Matt  Holden
 - Aug 06, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The internet company found illegal images in his Gmail account.
                    
			            - By Matt  Holden
 - Aug 05, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.
                    
			            - By Jason  Dover
 - Aug 05, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A security breach in June might have led to customer data theft.
                    
			            - By Matt  Holden
 - Aug 04, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Place a round, nickel-sized sticker on your skin where it’s easily accessible and tap your smartphone on the sticker to unlock it.
                    
			            - By Ginger  Hill
 - Aug 04, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits. 
                    
			            - By Phil   Scarfo
 - Aug 01, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Reverse engineered firmware revealed an embedded controller chip that could be the beginning of wreaking havoc on computer systems. 
                    
			            - By Ginger  Hill
 - Jul 31, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Questions still remain about the implementation and effectiveness of this rule.
                    
			            - By Matt  Holden
 - Jul 25, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Typewriter sales in German economy boom as tool to thwart cyber spying.
                    
			            - By Ginger  Hill
 - Jul 25, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Enhancements give developers access to a single stack of development-language-agnostic APIs for both card-present and card-not-present transactions, allowing for easier integration across all channels.