Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Embedded analytics is helping businesses learn more about their customers - eliminating pain points and helping with predictive analytics....


Could your organization be hacked? Why not hire a hacker to find out? Many are turning to ethical (white hat) hackers to test system...


The proper automation can tend to major incidents with little or no human input, responding more quickly than a human could, and helping...


Cyberattacks such as data breaches involve more than just the internal IT department. The aftermaths can involve customers, partners and...


The exponential explosion in the value of bitcoin and other cryptocurrencies has garnered the attention of investors the world over. It has...


Despite growing up with unprecedented access to technology, millennials are falling victim to cybercrime more than any other generational...


A data breach impacting personal identifiable information (PII) can ruin someone's life, but an attack on critical health infrastructure...


The internet, while an indispensable tool, is also the most likely access point for malware. Browser isolation allows internet use while...


Everyone knows that a chain is only as strong as its weakest link, and the same goes for software - its security is only as strong as its...


Despite good intentions, ethical hackers are are sometimes prosecuted for their discoveries. Do they need broader legal protection?


Distributed denial of service (DDoS) attacks have plagued businesses and individuals alike for years, but is the end in sight? Blockchain...


It felt like 2017 was a banner year for cybercrime, with headlines about the Equifax data breach and WannaCry ransomware, but in 2018 the...


As the holidays approach and shoppers shift into high gear, so do hackers. Protect yourself and your business against data breaches so that...


AI and IoT are bringing exciting new advancements, not just for ordinary folks, but for hackers as well. As malicious entities try to...


Companies face many risks when it comes to data breaches. Some occur digitally; some occur when a piece of hardware is stolen from the site...


We all want to protect our private information when browsing online, but how possible is it, really? Here we take a look at different types...


Phone hacking is a widespread problem that is expected to grow with the increasing prevalence of smartphones. Fortunately, there are many...


The latest changes in NIST password requirements are welcome changes for both users and administrators: no more special characters, and no...


Cybersecurity consists on an intricate web of technologies, all working side by side to protect your digital assets. Here we take a look at...