
An attack on the point-of-sale systems at retail giant Target over the holidays may have exposed sensitive data, including PINs, from tens of millions of payment cards.
Read MoreAn attack on the point-of-sale systems at retail giant Target over the holidays may have exposed sensitive data, including PINs, from tens of millions of payment cards.
Read MoreTechnological alternatives to cash and credit have entered the spotlight in 2013, promising convenience but often delivering security issues.
Read MoreAmid the long enrollee waiting times and the simultaneous fervor created by the federal government shutdown and standoff over the statutory debt ceiling, U.S. government observers and consumers alike may have overlooked the security red flags on healthcare.gov.
Read MoreFollowing the leak of a classified slide deck by an NSA contractor this past June, the agency’s previously secretive PRISM program entered the public spotlight and inspired vigorous debate over its legality and overall implications for individual privacy.
Read MoreThe advent of software-as-a-service (SaaS) has changed how enterprises approach their IT operations, with many departments now regarding server infrastructure management, maintenance and vigilant security monitoring as tasks properly assigned to their cloud providers.
Read MoreThe adoption of mobile devices and a BYOD (Bring your own Device) policy likely means that organizations will see a rise in their level of productivity. A report from the Australian Mobile Telecommunications Association found that the productivity benefit of BYOD will actually reach $11.8 million Australian dollars, or just under $11 million U.S. dollars, by 2025.
Read MoreHigh profile attacks have been gaining steam, with The Hill’s Brian Fitch wrote on the Congress Blog that there is an emerging need for more cyber security in Wall Street.
Read MoreAlthough security is always a concern with healthcare organizations, many are taking the route of using mobile devices as part of a BYOD (Bring your own Device) plan and worrying about securing data and devices to take advantage of the benefits these systems offer.
Read MoreIt’s a trying time to be an IT director tasked with navigating a company’s move from corporate-liable devices to a BYOD (Bring your own Device) program. Ryan Faas of CITEworld said the recent CITE Conference and Expo had many professionals saying that BYOD could be considered more of a “people problem” than a strictly technical concern.
Read MoreIn an effort to improve the data security of the country, the General Services Administration is now seeking input to develop improved language for cybersecurity measures taken with new procurements.
Read More