Security

Security | News, how-tos, features, reviews, and videos

resolution primary

15 IT resolutions for 2019

Tech teams need to lose the grunt work, go on a dev diet, and exercise more strategic thinking.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

AI's dark secret? A desire for data without bounds

The AI revolution is hungry for personal data. The U.S. needs to pursue federal privacy legislation before machine intelligence and surveillance intersect.

lightning clouds storm thunder

Rethinking disaster recovery for the cloud

DR practices that were designed for in-house computing are out of sync with the cloud world. If you haven't already revised your DR plan for cloud computing, now's the time.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

By 2020, 60 percent of digital businesses will suffer major service interruptions

The sheer number of cyberattacks resulting from an inability to manage risks — and the burgeoning talent shortage to deal with it — will force CIOs to rethink their defense strategy.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

3 ways Mastercard uses AI to fight fraud

Mastercard leans on cutting-edge AI tools to combat cybersecurity threats at a time when the world is moving toward digital payments facilitated by contextual commerce.

screen shot 2018 09 21 at 10.43.22 am

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

stateofcybercrimethumb

Escaping the line of fire: 2018 U.S. State of Cybercrime

One in four of organizations report greater monetary losses.

Rendering of Cyber Security Center in Augusta Georgia, courtesy of Georgia Technology Authority.

Unique collaboration turned a governor’s vision of a cyber center into reality

Interviewing the State of George's CIO Calvin Rhodes, who helped lead a collaboration of government, academia, the military and the private sector to create a new cyber ecosystem.

security group team circuitry

Lack of C-suite collaboration hampering cybersecurity, report finds

As cyber-attacks grow in frequency, chief information security officers and C-suite executives must work more closely together.

The U.S. Capitol building in Washington

GSA’s entity validation request for proposal is flawed

The plan to create a government-run identifier raises intellectual property concerns and duplicates private sector efforts.

aerial view of pentagon government security dv1282020

Pentagon CIOs struggle with legacy tech, security. Sound familiar?

Defense Department tech chiefs working to modernize sprawling IT infrastructure encounter similar hurdles — if on a larger scale — as CIOs in other agencies and the private sector.

phishing hacker binary keyboard privacy security breach

What exactly is a privacy risk?

Without knowing what privacy risks are, businesses and consumers would be left in the dark under new privacy law proposals.

businessman stranded on an outcropping of rock in the ocean, surrounded by sharks

Top 10 GRC mistakes — and how to avoid them

A sound governance, risk and compliance (GRC) strategy is more valuable — and harder to hone — than you might think. Here’s how to avoid looming disaster.

3 legal law books

New privacy laws must permit valuable uses of public records

Let’s be careful not to shortchange the free flow of public data in the rush to pass new privacy.

1 network internet connected grid earth power satellite view

Can the internet crash? How the unthinkable could happen

If the dark day comes when the internet does experience a global crash, the thing that takes it down will be, almost by definition, the thing we didn't see coming.

11 sharing

Data sharing: a problematic idea in search of a problem to solve

Proposals to require companies to share their data are riddled with flaws and solve no pressing marketplace defects.

USA / United States of America / American flag

It’s time for a uniform national privacy law

In light of new laws from Europe and California privacy needs to be on the Congressional agenda.

8 authentication basics password identity protected security

Sheltered Harbor ensures cyber resilience for financial services firms

After the infamous Sony Pictures hack in 2014, the financial services industry came together to develop Sheltered Harbor to ensure customer financial data would remain secure and accessible in the event of a cyberattack.

data analytics - statistical analysis - charts, graphs, strategy planning

Sprint calls on open source analytics to prevent cyberfraud

Sprint’s open source Elastic Stack analytics implementation helped the mobile device and network provider reduce mobile phone fraud by 90 percent.

hacker

Online manipulation is the latest data protection debate

The furor over “dark patterns” reveals the limits of consumer control as the primary tool of data protection.

Load More