Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




As quantum technology becomes a reality, this cybersecurity quandary has become a true cat vs. mouse game. It’s too early to predict how...

Quantum Cryptography Vs. Quantum Hacking: A Cat and Mouse Game


What's happening in the field of biometrics? Some people would say: not much. Some others, who are closer to the industry, would say a lot...

Biometrics: New Advances Worth Paying Attention To


In truth, encryption is rooted in practices that date back thousands of years. The technology and codes have changed, but some of the...

Encryption Vs. Decryption: What's the Difference?


Since cyberattacks have ramped up over the past few years, data encryption needs to keep pace. But what advancements should be considered...

Expert Feedback: What Data Encryption Advancements Should Businesses Be Aware Of?


Encryption backdoors will clearly and overwhelmingly jeopardize the privacy and security of everyone. The government should ponder on the...

Encryption Backdoors: The Achilles Heel to Cybersecurity?


New cyberthreats are emerging in infrastructure with broad opportunities being brought forward by increased connectivity.

Cybersecurity and Infrastructure: Current Trends and Future Developments


Modern cybercriminals are becoming more aggressive every day, but they're not the only prying eyes trying to spy on your data

Cryptography: Understanding Its Not-So-Secret Importance to Your Business


The National Museum of Computing needs to track the continuous health of important technological artifacts before disaster strikes—they...

How This Museum Keeps the Oldest Functioning Computer Running


Learn the truth of what actually happens in those massive data breaches that claim millions, even billions, of user IDs were sucked into...

Massive Data Breaches: The Truth You Might Not Know About


Data privacy advocates succeeded in pushing for regulations in the EU in the form of GDPR. On the other side of the Atlantic, individual...

Privacy Compliance: Gearing Up for 2020


One of the major cyber security predictions for 2020 is that there will be a rise in ransomware attacks; not just your average ransomware...

6 Cybersecurity Predictions for 2020


Hackers attack a computer every 39 seconds, but what's almost as surprising is the number of people who believe that they’ll never be...

The Truth About Cybersecurity


Phishing scams are rapidly evolving both in terms of the tools being used and the cleverness with which they are being designed. But there...

How to Keep from Getting Phished in 2020


Some believe facial features or the way you type, are more secure than a password, but there are still millions of data breaches and...

Understanding Biometric Security: The Growing Threats and How to Beat Them


Learn what the biggest cybersecurity threat facing the healthcare industry is right now and what we can do about it.

The Growing Cybersecurity War on the Healthcare Industry


With any new technology, there are trade-offs, and unfortunately, IoT systems and devices can create threat vectors for cyber attacks.

How IoT Can Compromise Your Home's Safety and Security


Learn how relatively inexpensive it is to add IoT features to a product, and how this has helped to make life easier and more convenient to...

How IoT Can Make Your Home Safer and More Secure


Is a security-by-design approach the best way to limit IoT cybersecurity risks in the workplace? We asked the tech experts to weigh in.

Straight From the Experts: How to Limit Cybersecurity Risks with Workplace IoT Devices


AI and ML are also powerful forces in disrupting cybercrime, protect enterprises, and safeguard data against breaches and exploits. What...