The Wi-Fi Alliance officially launches its latest protocol, which offers new capabilities for personal, enterprise, and IoT wireless networks. Wi-Fi connections soon will become easier to secure with a...
Read morePaper Documents Also Have to Be Protected
June 26 2018Several years ago, creating a cybersecure home was simple; most homes consisted of nothing more than a wireless network and several computers. Today, technology has become far more complex...
Read moreA vulnerability in Apple’s iOS lets anyone with a Lightning cable bypass the passcode entry restriction designed to protect the company’s devices. Any hacker equipped with the right knowledge...
Read moreIntel vice president Rick Echevarria discusses the challenges of balancing data security with new technologies like blockchain and artificial intelligence. It’s tough for businesses to make use of data...
Read moreMalicious Office documents are the weapon of choice among cybercriminals, who use files to access remotely hosted malicious components. Email is a common means of delivering cyberattacks, and Microsoft...
Read moreIf your team is manually building cloud instances and networks for every application, you’re setting yourself up for a data breach. Forty-eight percent of companies have experienced application downtime,...
Read more7 Places Where Privacy and Security Collide
June 24 2018Privacy and security can experience tension at a number of points in the enterprise. Here are seven – plus some possibilities for easing the strain. (Image: Joyseulay) In a...
Read moreAt least 10 US cities running Click2Gov software have alerted citizens to a data breach, but it turns out the problem was in the application server. A discovery has...
Read moreDestructive Nation-State Cyberattacks Will Rise
June 24 2018More than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months. Incidents like last year’s...
Read more
Recent Comments