Several major data breaches may be part of a ripple effect. More >
Classes are officially in session. What better time than the start of a new school year to brush up on your cloud security knowledge? More >
News this week included general availability of GE Predix for data analytics, a large Android vulnerability, Nest's Weave application layer and quantum computing. More >
A surprisingly diverse number of opinions were revealed about the current status of IoT adoption, where it will be in the future, and how to leverage it today. More >
The world of mobility changes at lightning fast speed, so a very important step for the enterprise will be to ensure that enterprise mobile apps are reasonably secure. More >
Perhaps it isn’t a coincidence that the EMV standards are supposed to begin on the same day that we welcome the annual National Cybersecurity Awareness Month. More >
As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.More >
A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.More >
A Symantec exec breaks down the three main categories of cybersecurity threats.More >
In their fourth year, the Tabby Awards are introducing a new category specifically for the best business smartphone apps -- the Mobby Awards/Business.
Riverbed CTO Hansang Bae says that rather than requiring IT to deploy and manage complex infrastructure inside the branch, Project Tiger will become the foundation through which storage and security services are provided in the branch office.
Everyone wants to do great things, but few actually do. Why? Most people are either afraid to think big, believe they don't have what it takes, or don't want to commit to putting in the kind of effort required to accomplish anything truly great.
Android Marshmallow offers some new capabilities and a number of tweaks that users will look forward to. Here are the 10 most compelling new features.More >
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...
This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...