Security | News, how-tos, features, reviews, and videos
While CIOs have shored up PCs and software systems for years, they should start to look at video conferencing systems, webcams and other inconspicuous network devices, which can be exploited to trigger devastating DDOS attacks.
The U.S. infrastructure is outdated and vulnerable to cyberattacks. If government reaction doesnu2019t improve the country electrical could be crippled.
AWS, Microsoft and Google are building data centers in Europe to address privacy concerns in a post-Snowden world. Cloud infrastructure revenue is rising, but how much better could be for U.S. vendors?
Can machine learning save cybersecurity?
Are financial institutions vulnerable to a cybersecurity Black Swan event?
In the wake of data breaches, cyber espionage and cybercrime, organizations in 2015 gave security a higher profile than ever before.
Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2016, information security professionals must understand these five trends.
A healthcare CIO reverses course and lets doctors use the cloud service, but only with a layer of data encryption for security.
From data breaches and cyberthreats to uncertainty around mobile, cloud and the Internet of Things, these are the security stories that dominated 2014.
U.S. agents can search and seize the laptops of international travelers at the border, so take precautions to protect confidential business information