Security | News, how-tos, features, reviews, and videos
Adobe's Flash just isn't worth keeping on your Mac
It's Stallman's philosophy that 'a program must not restrict what jobs its users do with it' -- and that includes the NSA.
It's still the early days of 'smart luggage' and connected baggage, but these 10 technologically enhanced travel tools suggest the future is bright for tech-savvy roadwarriors.
While you still canu2019t use the infamous u2013 and misunderstood u2013 digital currency to pay for goods at your local big box outlet, Bitcoin use for real goods and services is growingu2026fast.
Despite significant investment in cybersecurity, organizations’ current approaches fall short, introducing rising levels of vulnerability. Validated Zero Trust is here to change that.
More than a year after Microsoft ended support for the aging OS, some high-profile organizations are still using Windows XP u2013 and putting themselves at risk.rn
A debate is raging over what to call a new breed of security software -- User Based Analysis or Active Breach Detection. Call it what you will, writes Rob Enderle. Just donu2019t be the one to name it.
Rather than seeking to undermine data security for everyone except itself, the government should ask companies to follow its own example u2013 use strong encryption when it is needed.
I am a huge fan of the Nest Thermostat, but Nest Cam doesn't measure up
Tech chiefs come together to sift through security issues, ranging from cybersecurity to budgets to CISO roles.
Sponsored Links