Mixing money and mobility even under perfect circumstances will worry people. Winning their trust is the key. More >
A new study shows that mobile devices have become a hot target for hackers, which should prove to businesses that BYOD security needs to be top of mind for everyone, not just IT. More >
This document provides the empirical rationale for critical patient safety-related usability guidelines for standardization of EHRs. More >
As vendors have become more important in the day-to-day functioning of businesses, companies need to ensure that their data is safe on these third-party networks. More >
Top trends for 2016 that will have a significant impact on organizations, end users and IT, create business disruptions, and require major investment. More >
Studies reveal that enterprises spend almost half a million to recover from a data breach; however, many still don't increase security efforts after. More >
As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.More >
A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.More >
A Symantec exec breaks down the three main categories of cybersecurity threats.More >
Android Marshmallow offers some new capabilities and a number of tweaks that users will look forward to. Here are the 10 most compelling new features.
In a world where boards seem disengaged and clueless, Microsoft’s board stepped up and made the perfect choice in a CEO. Today was a showcase of what can result. Microsoft has gone from treading water badly to contending for leadership again.
IT hiring in 2016 is expected to continue to be a relatively fierce market, favoring employees looking for new positions.
Top trends for 2016 that will have a significant impact on organizations, end users and IT, create business disruptions, and require major investment.More >
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...
This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...