Security | News, how-tos, features, reviews, and videos
Board members have a unique responsibility to protect their companyu2019s assets and customer information.
In this interview, Cory Doctorow, the celebrated author and copyright activist, discusses his upcoming SCaLE keynote presentation and the threat of copyright and digital rights management.rn
The capture and arrest of one of the world's most notorious drug lords once again puts the spotlight on mobile message encryption and the companies that provide such services.
As the end of 2023 approaches, it’s imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken.
There is a misunderstanding that under pressure people perform better. Pressure to a certain degree is fine and can have a positive impact on performance, because people become aware of the fact that things have to get done. But too much pressure wil
How do you address the risks of breach and disclosure associated with redundant, obsolete or trivial data?
As we come back from holidays, we tend to reflect on what 2016 will bring, trends and upcoming changes on how buyers and service providers engage. Recently a lot has been said and written about two prominent trends: digital and automation. However li
How many times have your eyes seen one thing, but your mind believed another? 'Sleight of hand' is present when it comes to our interpretation and analysis of data. Understanding how our perception varies of data based on how they are prese
Chairs of FTC and FCC look ahead to a year that will see continued inquiries into tech firms' data collection practices and an ambitious effort to build out mobile broadband capacity.
The New Year promises to usher in a new set of tech startups looking to capitalize on the rise of enterprise wearables, counterterrorism, finance and payments tech, and even private space exploration.
Sponsored Links