Security | News, how-tos, features, reviews, and videos
She will succeed the renowned privacy and security expert Ashkan Soltani.
Google refutes such allegations and says itu2019s tools comply with both the law and their promise on student privacy.
CIO.com spent a month testing BlackBerry's first Android smartphone with a focus on the businesspeople and IT managers who will use and support it. The PRIV is the most capable BlackBerry ever, but does it deliver on what may be its most importa
The Paris attacks have given the government an excuse to renew efforts to gain access to encrypted private communications. It's a bad idea
As the end of 2023 approaches, it’s imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken.
Awareness is key, the more aware an employee is the safer they will be as they perform day-to-day activities in a dangerous environment. Effective cybersecurity strategies employ the same focus on end user awareness.
A popular toy manufacturer is the latest victim of a large-scale hack, and the breach opened the door for more damaging future attacks on the company's customers and their children.
Security concerns rate at the top of NASCIO poll for third straight year, while cultural and administrative challenges slow the adoption of cloud computing in state governments.
The company is being open, but not giving away the store.
While most companies have processes in place for managing administrative and other privileged accounts -- the sorts of credentials frequently used in high-profile data breaches for the past several years -- most do a poor job of enforcing those proce
Sponsored Links