What can the Cold War teach us about data security? More than you may realize. Explore alternative methods for securing transmitting data.
The education industry faces a security crisis, one that goes beyond protecting the classrooms and hallways. IT professionals in the education sector see cybersecurity as their top priority, consistently ranking it as their No. 1 concern. However,...
Most cybercriminals are after money. To safeguard your network from money-hungry fraudsters, you need to know where your most valuable assets are stored.
The Internet of Things offers convenience and fun in the form of step counters and other innovative toys, but it also puts health data and PII at risk.
Health care security threats that compromise the confidentiality, integrity and availability of critical data can force hospitals to halt operations.
Under a strong data control framework, vendors provide exceptional analytics tools without requiring owners to relinquish total control of the data.
An FTP server, and especially anonymous FTP services, can be a significant security flaw that puts health care offices at risk.
Secondhand mobile device security is a struggle for many, according to new research. Data found that 40 percent of reused devices still contain old PII.
MOPs may allow a vehicle to cloak its position information from location services by using all radio communication channels available to it.
As smartphone use skyrockets in India, so does the threat of cyberattacks against Indian government agencies, banks, businesses and individual users.