Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




A Mobile Device Management (MDM) service means that even without a dedicated IT Team your small or medium business can thrive, even...


Explore current best practices IT security professionals use to keep corporate, government and other organizations' systems safe.


The Chrome browser is generally accepted as a very secure way to access the internet. But secure doesn't mean free from threats like...


Spurred by COVID-19, cybersecurity advancements from gadgets to telehealth and privacy protection are crowding the second half of 2020.


How Does Data Protection and Privacy Look in 2020? Since 2018, there has been many proposals for federal privacy laws, and none of them has...


As organizations tap into big data and rush to integrate intelligence, we must start to put in place regulation so that technology is a...


When it comes to free internet services, that often means that you’re paying by providing data that may be far more valuable than the fees...


Blockchain is widely regarded as a disruptive technology that revolutionized the financial industry due to its use for creation of...


We reached out to the experts to get insight into the nature of ransomware attacks and what steps businesses should take to protect their...


All about the work of an Information Security Engineer.


To think we’ll be able to completely avoid smart devices to protect our privacy seems far-fetched. So gather as much information as you can...


We'll take a detailed look into the typology of cryptomining malware, and discuss five of the biggest crypto-malware attacks. Plus, we'll...


New hacking tools and techniques are on the verge of breaking even the most hardened data protection capabilities of today. Fortunately,...


While some technologies exacerbate the problem of fake art on the market, another technology advancement may solve it. Blockchain has...


Being proactive about cybersecurity for remote work will pay off in averting data breaches and headaches down the road.


The challenges in 2020 and beyond that Identity and Access Management addresses may turn out to be footnotes — or may change the way we...


Could creating a backdoor or skeleton key for law enforcement create more problems than it solves? Learn how encryption affects privacy...


With large numbers and cases of security breaches affecting the world, it's obvious that we need to find more secure solutions other than...


Proper data protection is a must for any enterprise, but in the healthcare industry it can become a matter of life and death.