How does Star Trek's information security stack up against current cybersecurity hygiene best practices? Turns out the future's not so bright.
Is providing effective cybersecurity for the healthcare sector an IT problem or a wider-scope issue? The short answer is that it's both.
For the enterprise responsible for protecting customers' PII, should passwords be stored at all — even encrypted?
The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.
A notable takeaway from the report was that despite fewer reported data breaches, 2018 witnessed a 126 percent uptick in the number of records breached containing personally identifiable information.
A data leak involving a family tracking app exposed the real-time locations of more than 238,000 users for weeks as a result of a database misconfiguration.
Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.
A recent security incident that began as an email leak exposed more than 2 billion records containing email addresses and other personal information.
The car of today — and especially tomorrow — relies on countless lines of software code to get those wheels moving, a reality that has placed increasing importance on automotive cybersecurity.
The onus to meet the challenge of consumers' security and privacy expectations is on the enterprise. Developing a security plan around consumer concerns is a good first step.