Mobile Payments Struggle for Security, Trust, Users

Mixing money and mobility even under perfect circumstances will worry people. Winning their trust is the key. More >

Mobile Devices Responsible for an Increasing Number of Breaches

A new study shows that mobile devices have become a hot target for hackers, which should prove to businesses that BYOD security needs to be top of mind for everyone, not just IT. More >

Technical Evaluation, Testing, and Validation of the Usability of Electronic Health Records

This document provides the empirical rationale for critical patient safety-related usability guidelines for standardization of EHRs. More >

10 Best Practices for Sharing Sensitive Information with Vendors

As vendors have become more important in the day-to-day functioning of businesses, companies need to ensure that their data is safe on these third-party networks. More >

Top 10 Strategic Technology Trends for 2016

Top trends for 2016 that will have a significant impact on organizations, end users and IT, create business disruptions, and require major investment. More >

Breaches Are Expensive, but Perhaps not Expensive Enough

Studies reveal that enterprises spend almost half a million to recover from a data breach; however, many still don't increase security efforts after. More >

More Articles >


Collaboration Between HR, IT Essential to Prevent Data Breaches, HR Exec Says

As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.

More >

MacKeeper Has More Work to Do to Clean Up Its Act

A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.

More >

A Conversation About Symantec’s 2015 Internet Security Threat Report

A Symantec exec breaks down the three main categories of cybersecurity threats.

More >

More Interviews >

Most Popular Features

10 Things to Get Excited About in Android Marshmallow

Android Marshmallow offers some new capabilities and a number of tweaks that users will look forward to. Here are the 10 most compelling new features.

Microsoft Devices Launch Raises the Bar

In a world where boards seem disengaged and clueless, Microsoft’s board stepped up and made the perfect choice in a CEO. Today was a showcase of what can result. Microsoft has gone from treading water badly to contending for leadership again.

2016 Most In-Demand IT Positions

IT hiring in 2016 is expected to continue to be a relatively fierce market, favoring employees looking for new positions.

Related IT Downloads

Security35-290x195.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...

Security28 Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...

Misc29 Interfaces for Personal Identity Verification

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.