Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Edward Snowden's revelations of government access to personal data has cast suspicion on just how secure 'encrypted' data really is. Can...


Google tries to make end-to-end email encryption simple to use. It will be, but there are caveats. Learn more about it here.


Bring-your-own-device policies are becoming more common in businesses today. But before implementing them at your company, here are some...


Malware doesn't just affect computers anymore - it's becoming an ever-increasing threat to Android devices as well. Learn about Android...


High specification buildings called data centers house most of today's business-critical Internet. And the technology is like something out...


Once data has been disseminated from its originator, keeping it secure can be quite a challenge. Here we discuss some strategies for...


While you’re sharing your life with your apps, those useful tools are broadcasting your information to the rest of the world. Find out how...


Android marketplaces are not vetting applications sufficiently. A North Carolina State University research team has a solution that will...


Due to its anonymous nature, bitcoin has become associated with cybercrime - with its users becoming both the perpetrators and victims of...


Unsolicited emails account for as much as 95 percent of all email. Fortunately, the technology industry is coming to the rescue. Find out...


There are limits on how much information law enforcement agencies and government can collect about you. Unfortunately, the restrictions on...


CryptoLocker began crippling computers in late 2013. Now the new and improved PowerLocker has been discovered, and is even more dangerous...


With governance and compliance regulations constantly changing and growing more complex, it can be hard for businesses to keep up. These...


Electronic health records have a lot going for them, but there's also plenty at stake. Here we take a look at key problems.


The cybersecurity field is growing, profitable and full of possibility. We asked experts in the field what this career is about - and how...


As cyber threats continue to evolve, old security solutions just don't cut it. Here are a few technologies that have been rendered minor...


The growing proliferation of personal devices in the workplace is a bit of an albatross for IT administrators. MDM and MAM aim to help. The...


Ever since we found out the NSA was collecting millions of phone records, it's easy to wonder whether we're all being watched. Here we try...


Here are five key points to remember about the National Security Agency's (NSA) domestic surveillance program and your electronic security.