IT managers must know what types of data cybercriminals covet to close any security loopholes that might lead to a security breach.
Online lodging and transportation services offer unprecedented convenience, but their data collection practices have rankled hospitality security experts.
Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.
All access is not created equal. To protect your crown jewels from an insider threat, it's critical to know your data and, more importantly, your users.
This list of notable 2016 data breaches can serve as a cheat sheet for a security professional who is pressed for the latest tech news during the holidays.
Companies around the world must review the processes by which they collect and store personal data to prepare for the upcoming GDPR compliance regulations.
Automation and analytics can help IT professionals speed up and solidify their data protection programs and prepare for regulatory audits.
Bluetooth security is not strong enough to keep fraudsters from eavesdropping on sensitive communications. The upcoming Bluetooth 5 offers enhancements.
A recent Dailymotion hack means the account details and email addresses of 85 million users have potentially been compromised.
The list of notable 2016 data breaches is long and wacky. Cybercriminals compromised food delivery apps, FBI databases and seemingly everything in between.