
A company can pride itself on accuracy and the quality of the products and services it delivers, but when those systems are exploited for personal gain, it leaves the company in a bad situation financially and publicly.
Read MoreA company can pride itself on accuracy and the quality of the products and services it delivers, but when those systems are exploited for personal gain, it leaves the company in a bad situation financially and publicly.
Read MoreTo restore faith in its data protection capabilities, Dropbox has decided to offer optional two-factor authentication in its latest experimental build.
Read MoreThe consumerization of IT is completely overhauling the enterprise, as BYOD (bring your own device) and other mobile programs now allow employees to use personal smartphones, tablets and laptops for work-related tasks.
Read MoreLegislation may be both the cause of and solution to inconsistent cybersecurity reporting practices in the EU.
Read MoreCloud computing is on the rise in the private sector, lifted by the technology’s promise to reduce IT expenses, enhance remote access to application and boost employee performance.
Read MoreSaudi Aramco learned earlier this month that it had been infiltrated by a malicious virus originating from “external sources” and affecting approximately three-quarters of its computer workstations.
Read MoreThe federal IT landscape has evolved during the last several years as new technologies, strategies and mandates continue to be piled onto decision-makers’ shoulders.
Read MoreEver since Anonymous and LulzSec proved that cybercriminals could achieve celebrity status on the web, there has been a consistent stream of hackers trying to make a name for themselves by disrupting the operations of high-profile companies.
Read MoreAdvances in mobile technologies have introduced a number of new benefits to the enterprise, allowing employees to be more flexible and access mission-critical applications and solutions from virtually anywhere.
Read MoreAs the Obama and Romney campaigns try to attract digital native voters by venturing into mobile application development, it seems that both camps are showing their naivete when it comes to data protection and privacy issues.
Read More