Security

Articles

What's Next After the EMV Migration? Tokenization

Security controls need to be put in place to protect cardholders' confidential information all the way through the transaction process. More >

Why Cloud Security Threats Shouldn’t Inhibit Cloud Adoption

Yes, cloud security is a big deal. But there are ways to protect your data from the latest threats, so don't say "no" to the cloud because of fear. More >

C-Level Execs Aren’t Stepping up to Prevent Cyberattacks, Survey Finds

A survey by Accenture Strategy found that though 63 percent of enterprises experience a cyberattack once a week, executives aren't doing enough to prevent them. More >

Apple Security in the Enterprise: Safer, Not Perfect

Apple is not perfect in its approach to keeping devices and data safe. In some cases, the problem isn’t Apple itself – it’s the tendency of employees to disregard security. More >

BlackBerry and WatchDox: 9/11 and Our Sadly Ironic Security Conundrum

If we were talking exposures for the PC platform and a similar dearth of tools, this class of product would be seen as critical to the security of the firm, but that doesn’t appear to be the case. More >

Survey Finds that Almost No One Likes Passwords

A new survey found that 84 percent of consumers questioned wanted to get rid of passwords altogether. But would they actually use two-factor authentication? More >

More Articles >

Interviews

MacKeeper Has More Work to Do to Clean Up Its Act

A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.

More >

A Conversation About Symantec’s 2015 Internet Security Threat Report

A Symantec exec breaks down the three main categories of cybersecurity threats.

More >

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.

More >

More Interviews >

Most Popular Features

Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their Q3 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.

Jeff Bezos’ Confirmation Bias Could Kill Amazon: A Teachable Moment

Jeff Bezos seems to have on blinders. The New York Times' expose on the internal environment at Amazon should be a huge wake-up call for him instead.

10 Features that Will Make You Love Windows 10

IT Business Edge's Paul Mah looks at the final version, and highlights a number of features that should make you love Windows 10.

Related IT Downloads

Security28 Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...

Misc29 Interfaces for Personal Identity Verification

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date