Security | News, how-tos, features, reviews, and videos
Five CIOs discuss with CIO.com their big plans for the New Year.
Instead encourage users to keep their systems up-to-date.rn
We are all sick (literally) and tired of the endless rounds of 'catch the data thief' playing at a hospital near you. Since these hospital attacks begin in 2014, they seem to get worse each year. Now industry pundits are indicating that 201
As digital transformation overtook the enterprise in 2016, security professionals have struggled to keep up with a shifting technology and cultural landscape while keeping one eye ahead on the threat horizon.
Infrastructure, specifically the utilities sector, must adopt a Zero Trust approach as ongoing cyberattacks by remote actors become more and more prevalent—threatening to disrupt everyday life.
I review my predictions for 2016, and offer a set of predictions for 2017 (while duly acknowledging that some things are unpredictable).rn
More automation means less vulnerable systems.
Apple is reportedly building its own iCloud servers to thwart the ability of the government to intercept its server hardware while in the mail.
IBM, others mount a growing list of projects beyond cryptocurrency.
Retail tracking generally works by monitoring individuals' movements in or near locations of interest. The specific mechanisms can vary but often involve recording signals emitted by individuals' smartphones, wearables and other wireless ac
Smart contracts based on blockchain can help you cut costs and waste and offer some much-needed visibility into your supply chain. Hereu2019s how they work.
Sponsored Links