Researchers find that companies that refurbish or accept old equipment as donations don’t necessarily clean them of data as promised. Here’s some eyepopping data about the computing devices that...
Read moreHealthcare information security suffers from the inherent weakness of using passwords to guard information. Chip-based smart cards could change that. Given the copious amounts of sensitive data coursing through...
Read moreHealthcare information security suffers from the inherent weakness of using passwords to guard information. Chip-based smart cards could change that. Given the copious amounts of sensitive data coursing through...
Read moreNational Cyber Security Centre and National Crime Agency investigate random attack that locked down the association’s data and deleted backups. An apparent ransomware attack hit databases and other systems...
Read moreNational Cyber Security Centre and National Crime Agency investigate random attack that locked down the association’s data and deleted backups. An apparent ransomware attack hit databases and other systems...
Read moreMicrosoft Brings Defender Security Tools to Mac
March 24 2019Windows Defender becomes Microsoft Defender, and it’s available in limited preview for Mac users. Microsoft is renaming its Windows Defender antivirus protection tool and bringing its security capabilities to...
Read moreMicrosoft Brings Defender Security Tools to Mac
March 24 2019Windows Defender becomes Microsoft Defender, and it’s available in limited preview for Mac users. Microsoft is renaming its Windows Defender antivirus protection tool and bringing its security capabilities to...
Read moreEven with common security platforms like CASBs, organizations struggle to deal with the volume of apps and accounts that interact with business-critical data. The pressure of increasing software-as-a-service (SaaS)...
Read moreEven with common security platforms like CASBs, organizations struggle to deal with the volume of apps and accounts that interact with business-critical data. The pressure of increasing software-as-a-service (SaaS)...
Read moreHacker AI vs. Enterprise AI: A New Threat
March 23 2019Artificial intelligence and machine learning are being weaponized using the same logic and functionality that legitimate organizations use. The adversarial use of artificial intelligence (AI) and machine learning (ML)...
Read more
Recent Comments