Security
This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.
10 Low-Tech Ways to Protect Digital IP
Digital IP can make or break a company, and its theft and misuse can be disastrous. Here we examine some low-tech ways to keep your IP out...
10 Tips for Avoiding Key Software Flaws
In software development, focus is shifting from eliminating bugs to fixing flaws, many of which happen again and again. Here are the top 10...
Who's Responsible for Cloud Security Now?
Data security is as important as ever, especially in business. But who is responsible for that security when data is stored in the cloud?
Internet of Things: Who Owns the Data?
Data is constantly being generated, especially from social media and the up-and-coming Internet of Things. But who owns that data? And what...
CISOs: Why Companies Need Them More Than Ever
The security of businesses and their customers is under scrutiny, meaning a greater need for security professionals. That starts with a...
Trusting Encryption Just Got a Lot Harder
Edward Snowden's revelations of government access to personal data has cast suspicion on just how secure 'encrypted' data really is. Can...
Google's End-to-End Encryption Isn't What It Seems
Google tries to make end-to-end email encryption simple to use. It will be, but there are caveats. Learn more about it here.
7 Points to Consider When Drafting a BYOD Security Policy
Bring-your-own-device policies are becoming more common in businesses today. But before implementing them at your company, here are some...
Why Android Anti-Malware Apps Are a Good Idea
Malware doesn't just affect computers anymore - it's becoming an ever-increasing threat to Android devices as well. Learn about Android...
5 Essential Things That Keep a Data Center Running
High specification buildings called data centers house most of today's business-critical Internet. And the technology is like something out...
Encryption Just Isn't Enough: 3 Critical Truths About Data Security
Once data has been disseminated from its originator, keeping it secure can be quite a challenge. Here we discuss some strategies for...
6 Ways to Keep Apps From Oversharing Your Personal Data
While you’re sharing your life with your apps, those useful tools are broadcasting your information to the rest of the world. Find out how...
Is This a Potential Cure for Malicious Android Apps?
Android marketplaces are not vetting applications sufficiently. A North Carolina State University research team has a solution that will...
How Safe Is Your Bitcoin Wallet?
Due to its anonymous nature, bitcoin has become associated with cybercrime - with its users becoming both the perpetrators and victims of...
Too Much Spam? 5 Technologies Designed to Block It
Unsolicited emails account for as much as 95 percent of all email. Fortunately, the technology industry is coming to the rescue. Find out...
Digital Data: Why What's Being Collected Matters
There are limits on how much information law enforcement agencies and government can collect about you. Unfortunately, the restrictions on...
PowerLocker: How Hackers Can Hold Your Files for Ransom
CryptoLocker began crippling computers in late 2013. Now the new and improved PowerLocker has been discovered, and is even more dangerous...
Beyond Governance and Compliance: Why IT Security Risk Is What Matters
With governance and compliance regulations constantly changing and growing more complex, it can be hard for businesses to keep up. These...
Electronic Health Records: Here's What's at Stake
Electronic health records have a lot going for them, but there's also plenty at stake. Here we take a look at key problems.