Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Digital IP can make or break a company, and its theft and misuse can be disastrous. Here we examine some low-tech ways to keep your IP out...


In software development, focus is shifting from eliminating bugs to fixing flaws, many of which happen again and again. Here are the top 10...


Data security is as important as ever, especially in business. But who is responsible for that security when data is stored in the cloud?


Data is constantly being generated, especially from social media and the up-and-coming Internet of Things. But who owns that data? And what...


The security of businesses and their customers is under scrutiny, meaning a greater need for security professionals. That starts with a...


Edward Snowden's revelations of government access to personal data has cast suspicion on just how secure 'encrypted' data really is. Can...


Google tries to make end-to-end email encryption simple to use. It will be, but there are caveats. Learn more about it here.


Bring-your-own-device policies are becoming more common in businesses today. But before implementing them at your company, here are some...


Malware doesn't just affect computers anymore - it's becoming an ever-increasing threat to Android devices as well. Learn about Android...


High specification buildings called data centers house most of today's business-critical Internet. And the technology is like something out...


Once data has been disseminated from its originator, keeping it secure can be quite a challenge. Here we discuss some strategies for...


While you’re sharing your life with your apps, those useful tools are broadcasting your information to the rest of the world. Find out how...


Android marketplaces are not vetting applications sufficiently. A North Carolina State University research team has a solution that will...


Due to its anonymous nature, bitcoin has become associated with cybercrime - with its users becoming both the perpetrators and victims of...


Unsolicited emails account for as much as 95 percent of all email. Fortunately, the technology industry is coming to the rescue. Find out...


There are limits on how much information law enforcement agencies and government can collect about you. Unfortunately, the restrictions on...


CryptoLocker began crippling computers in late 2013. Now the new and improved PowerLocker has been discovered, and is even more dangerous...


With governance and compliance regulations constantly changing and growing more complex, it can be hard for businesses to keep up. These...


Electronic health records have a lot going for them, but there's also plenty at stake. Here we take a look at key problems.