Security | News, how-tos, features, reviews, and videos
Can Microsoft Windows 10 users start thinking about using biometrics to replace u2013 rather than secure u2013 passwords?
With approximately 90 percent of businesses using the cloud in some fashion, it's safe to say the technology has become a mainstay in IT. But challenges remain beyond the initial integration.
Columnist Rob Enderle describes 2015 as yet another year when stupid decisions were the norm. He would like to see folks finally learning from their mistakes, but he wonu2019t be holding his breath.
In the wake of data breaches, cyber espionage and cybercrime, organizations in 2015 gave security a higher profile than ever before.
As the end of 2023 approaches, it’s imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken.
Experts expect a number of shifts in the IT outsourcing industry in 2016. Some of these shifts include a focus on hyper-speed deal making, new multi-sourcing headaches, more man-machine collaboration and more.
Apple's stance on encryption is absolutely correct, but Patently Apple just doesn't get it
Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2016, information security professionals must understand these five trends.
Identity theft guardian LifeLock hit with huge fine after being fined for the same offense five years ago.
What does the future of software look like? Experts share their opinions on how the industry will shift in 2016.
Some organizations faced with enterprise software selection make emotional, rather than objective, decisions; select technology before understanding their needs; get caught up in vendor hype; or find a solution that does not match their ability to ad
Sponsored Links