Security | News, how-tos, features, reviews, and videos
A debate is raging over what to call a new breed of security software -- User Based Analysis or Active Breach Detection. Call it what you will, writes Rob Enderle. Just donu2019t be the one to name it.
Rather than seeking to undermine data security for everyone except itself, the government should ask companies to follow its own example u2013 use strong encryption when it is needed.
I am a huge fan of the Nest Thermostat, but Nest Cam doesn't measure up
With data privacy and security becoming an increased concern, Sovereign cloud is turning from an optional, like-to-have, to an essential requirement.
Tech chiefs come together to sift through security issues, ranging from cybersecurity to budgets to CISO roles.
Today, there's a tradeoff between user privacy and the effectiveness of artificial intelligence (AI) apps such as Siri and Google Now. Apple's strong privacy stance may drum up kudos from consumers but also give Google a technological advan
Samsung readies fix for a security flaw that may have compromised as many as 600 million phones, including the Galaxy.
Are you really doing all you can to catch data thieves and prevent security breaches? Columnist Rob Enderle says if you havenu2019t deployed a user-based analytics program you are not doing all you can.
Companies that use wearables as part of their workplace wellness programs may soon have to answer to the U.S. government about how they use the data they collect from employees.
A new partnership between IT MOOC platform Cybrary and Women in Technology aims to address two major challenges faced by IT organizations today: a shortage of cybersecurity professionals and a lack of women in technology.
Sponsored Links