Good Technology CEO Christy Wyatt says initially it was relatively simple to extend the application programming interfaces (API) exposed by Apple to deliver simple notifications to the Apple Watch. More >
Try keeping up with the relative merits of different approaches to development, emerging ways of customizing apps based on data gathered about the device’s user and, as always, the status of security. More >
OTA analyzed approximately 1,000 websites in three categories: consumer protection, privacy and security. More >
While funding and awareness have increased, it is unclear if organizations are making investments that keep up with the evolving security landscape. More >
Already, criminals have developed a spear phishing attack that bypasses two-factor authentication methods on mobile devices to gain access to email accounts. More >
The increasing use of the Internet for health care guarantees that crackers will sharpen their attacks as time goes on. More >
A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.More >
A Symantec exec breaks down the three main categories of cybersecurity threats.More >
Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.More >
Five technology and operational trends that will help corporate IT organizations deliver better business outcomes via the optimal use of technology.
LastPass has been breached. Again. For at least the third time now since 2011. At what point is something an anomaly and at what point is it a trend?
According to a new analysis of Dice salary data, the need for security professionals has translated into salaries for certain tech professionals that greatly exceed the baseline for tech-pro salaries.
Customer experiences can be improved through a number of methods including technology and innovation, customer service operations, employee management and global sourcing.More >
This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...