Security | News, how-tos, features, reviews, and videos
Smartphones and mobile apps, particularly in the Android family, are becoming more susceptible to hackers. Bill Snyder of CIO.com highlights five easy ways to fortify your mobile apps against the bad guys.
Treating the cloud security discussion as a black-and-white issue, where public clouds are insecure and private cloud are secure, is overly simplistic and leaves organizations that pursue either type of cloud environment vulnerable.
The more I cover compliance -- which is a lot these days -- the more I realize that organizations still have work to do in discovering and protecting sensitive data. I actually think the problem is a simple one, and it follows that old adage: "T
Today's growing challenge: Data. There is suddenly too much of it, and while firms rush to mine it, they do so without adequate regard for the risks in keeping and using it.
An effective Governance, Risk and Compliance program delivers sustainability, consistency, efficiency and transparency against cyber threats.rn
Facebook beefs up its security measures to ward off spammers, clickjackers and malware. Here's what you need to know about Facebook's latest efforts to protect users from malicious software.
The biggest money-saving strategy of all is to avoid implementing requirements that turn out to be fake. Surprisingly, some of the biggest candidates can be in security.
India's proposed data privacy regulations could create serious logistical problems for offshoring customers if passed. Offshore outsourcing attorneys and analysts explain how the data protection rules will impact customers.
Alternatives to Second Life provide security while boosting productivity
China has proposed strict new data security regulations that could hamper the country's nascent IT outsourcing industry if made into law, even as they aim to give foreign business leaders confidence in the way the Chinese handle sensitive busine
The risks of not properly securing your home wireless network continue to increase. Consider the newest tales from the dark side then follow four steps to stronger Wi-Fi network security.
Sponsored Links