The holiday season rings in more than just higher sales for retailers. There's also more shoplifting and lower profit margins than the rest of the year, according to a report released today. Plus, this year, there's an extra surprise...
Since Sept. 11, 2001, the airline industry has been one of the fastest industries to upgrade their security procedures and protocols against various threats, both present and perceived. However, hackers don't need to board an airplane...
Medical device manufacturer Animas warns diabetic patients who use its OneTouch Ping insulin pumps about security issues that could allow hackers to take over the devices and deliver unauthorized doses of insulin.
A new feature in Apple's macOS Sierra lets you use your Apple Watch to easily unlock your Mac computer. However, the 'Auto Lock' feature won't work unless a set of security and authentication safeguards is also enabled.
Learn tips for evaluating a business continuity plan for your vital applications. Explore three approaches for geographically distributed business continuity for critical infrastructure to meet disaster recovery and data loss
Mission-critical computing sometimes gets lost in the talk generated by such topics as Big Data, cloud computing and the Internet of Things. Yet with every increasing customer expectations, the importance of mission-critical IT is
Frequently travelers who aren't prepared for the security risks associated with staying in hotels put potentially sensitive information and their own personal safety at risk. Here's how to spot common threats, and protect your data...
Explore best practices for reducing cost by as much as 35% on your Oracle database architecture by moving from scale-out to x86 scale-up infrastructure with a fast-failover solution. Learn four ways to save on Oracle licensing costs.
Incident responders from Akamai recently helped mitigate a DDoS attack against an unnamed European media organization that used six different attack techniques, including DNSSEC-based DNS amplification.
By combining its network visibility and breadth of integrated products, Cisco aims to make it simple for distributed and mobile businesses to deploy effective security while reducing the complexity required to manage it.