Recent cases of social engineering, DDoS attacks and domain-name theft have made headlines. Some stories had happy endings, but others didn't. Here are four tips for preventing these types of hacks from ruining your business.
BlackBerry's enterprise security briefing in New York intended to highlight the firm's acquisition of Secusmart – but the speakers discussing leaks of confidential diplomatic phone calls and easy hacks of driverless cars stole the...
Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies. Here are the latest picks to get undisclosed amounts of IQT...
At its annual Worldwide Partner Conference, Microsoft outlines a vision of a cloud-first company, touts the opportunities in government, education and healthcare, and aims to reassure partners that it's keeping customer data safe.
Instead of updating products every six weeks, as Google promised at the I/O developer conference, the company might want to slow down and make sure its products and services actually represent what its customers want.
Unexamined dark data can pose a threat precisely because of its mysterious nature. In many cases, data is unused not because it’s deemed useless, but because it’s not in a readily usable form, for example, unstructured, in need of
Police cannot generally search cellphones without a warrant when they are arresting someone, the U.S. Supreme Court ruled in a unanimous decision Wednesday that weighs heavily in favor of Fourth Amendment and privacy rights.
Responding to more than a year of pressure, Google and Microsoft will follow Apple in adding an anti-theft "kill switch" to their smartphone operating systems, U.S. law enforcement officials will announce later Thursday.
CIO fears about cloud adoption are well known. Ensuring security, protecting data, maintaining control of enterprise information and ensuring acceptable service levels are all traditional concerns that IT executives have expressed
A far-reaching bill that would require the government to obtain a warrant to search through people's emails and other online communications now has majority support in the U.S. House of Representatives.
Mining personal data to deliver targeted ads is the lifeblood of Google's business -- and of many other online firms. But what if that data dries up at the source?Google released an early version of a new tool recently that will...
By October 2015, merchants are required to have replaced their magstripe credit/debit card technology with Chip and PIN devices. Working with Randstad Technologies will ensure you meet the 2015 deadline and move to Smartcard payment