Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.
- By Jason Dover
- Aug 05, 2014
A security breach in June might have led to customer data theft.
- By Matt Holden
- Aug 04, 2014
Place a round, nickel-sized sticker on your skin where it’s easily accessible and tap your smartphone on the sticker to unlock it.
- By Ginger Hill
- Aug 04, 2014
While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits.
- By Phil Scarfo
- Aug 01, 2014
Reverse engineered firmware revealed an embedded controller chip that could be the beginning of wreaking havoc on computer systems.
- By Ginger Hill
- Jul 31, 2014
Questions still remain about the implementation and effectiveness of this rule.
- By Matt Holden
- Jul 25, 2014
Typewriter sales in German economy boom as tool to thwart cyber spying.
- By Ginger Hill
- Jul 25, 2014
Enhancements give developers access to a single stack of development-language-agnostic APIs for both card-present and card-not-present transactions, allowing for easier integration across all channels.
Authorities to announce the who they arrested and the number people victimized.
- By Matt Holden
- Jul 23, 2014
Mobile provider will offer rewards, with a catch.
- By Matt Holden
- Jul 21, 2014
Search engine offers way to look up login credentials from over 100 hacks, but what's the catch?
- By Ginger Hill
- Jul 21, 2014
Microsoft will follow in Google’s footsteps and allow users to block search results for their name.
- By Matt Holden
- Jul 18, 2014
With sophisticated technology comes risk if you are not vigilant in applying security updates.
- By Ginger Hill
- Jul 16, 2014
Apple customers warned to be aware of security risks on their iPhones.
- By Matt Holden
- Jul 14, 2014
6 steps on predicting the future of your network's security: process, enhance, cross-correlate, baseline and analyze information.
- By Benjamin Powell
- Jul 14, 2014
Team’s assistant coach says that they used years of research to study the Brazilian team.
- By Matt Holden
- Jul 11, 2014
Petition floating around Facebook supporting Lewis Alberto Suarez Diaz (the biter) scamming people out of their personal data.
- By Ginger Hill
- Jul 11, 2014
Complete with an example of a strong, unique password with a surprise at the end, this is a must-read!
- By Ginger Hill
- Jul 10, 2014
Security software company found over 40,000 photos plus 750 emails and texts.
- By Matt Holden
- Jul 09, 2014
Consortium hopes to establish common ground for connection by developing framework for manufacturers.
- By Matt Holden
- Jul 08, 2014