- Even the most secure cloud storage may not be so secure, study finds
- Blame Heartbleed: HealthCare.gov requires users to change their passwords
- Major security flaws threaten satellite communications
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Chrome OS may kill the password with Easy Unlock smartphone option
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
Obama's appointment of Vivek Kundra marks an important first step for rectifying the nation's concerns about IT.
IT and business both understand the need to protect regulated customer and business data -- so long as they're in business, analysts say. Here's a look at how some folding businesses are falling short protecting data and the possible liabilities for the IT group and CIO.
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
According to a report from Fox News, several servers at the World Bank Group, an organization that offers economic assistance to developing countries around the globe, were repeatedly compromised and breached over the course of the last year.
Shira Rubinoff was a practicing psychologist in 2004. When it came to technology, her experience was simply as a tech user, certainly not a tech guru. Then one day she was phished.
A new report warns that the cost from lost productivity at work related to the new NFL season could add up to US$10.5 billion. And there we were, thinking the biggest waste of time at work came from fielding an endless stream of IT industry reports?
Thanks to all the fear over data security breaches, a computer recycling operation has morphed into something much bigger - and potentially more lucrative - for the Saraiva brothers.
Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- In pictures: Customer 360 Symposium hits the Hunter Valley
- Why CMOs must embrace the seven principles of agile marketing
- Google opens the floodgates for new 'social' ads
- Telefónica starts exchange for targeted mobile ads
- Crowdsource guide ranks marketing automation platforms by user recommendations and company size