Security | News, how-tos, features, reviews, and videos
If it works as promised you may want to skip 7 all together
RIM recently released the PlayBook OS 2.0 software upgrade for its BlackBerry tablet, which packs a variety of new enhancements aimed at business users. But is the new update too little too late? CIO.com's mobile maestro Al Sacco delves into the
Google's new privacy policy went live last week. The new u001cfeatureu001d combines the information Google collects on you from all of its applications. If you feel like your privacy is at risk, here are four tips to help you remain as anonymou
Using predictive analytics to forecast IT failures is itself fraught with difficulty. But combined with artful human intervention, the tools can work.
An effective Governance, Risk and Compliance program delivers sustainability, consistency, efficiency and transparency against cyber threats.rn
Appearing before a House subcommittee, executives from Internet service providers such Comcast and AT&T warn against check-box compliance approach to cybersecurity.
Leader rolls over on troops faster than a kitten playing with a ball of yarn
Given that stolen medical records can bring $50 apiece on the underground market, the frequency and magnitude of data breaches involving electronic health records is increasing. In an effort to help CIOs and CSOs build a better business case for enha
Also in the news: U.S. sponsors contest to prove it can use Twitter to track fugitives and Mozilla lets users see which advertisers are tracking them
Google's updated privacy policy--which allows the company to share information about you across all of its services--has drawn criticism worldwide. Here's how its changes affect your online identity and why Google now needs to focus on maki
An Android security flaw that could let malicious apps steal images from users' devices was uncovered within days of the release of some frightening new mobile security stats, which spotlight Android as the mobile OS of choice for attackers.
Sponsored Links