At the one-year anniversary of the battle between the FBI and tech giant Apple over unlocking an iPhone, surveillance and privacy rules have not really changed. But they could this coming year, and the debate over that is as intense as ever. Read More ▶ |
|
| Video/Webcast: Neustar Inc Ransomware. Politically-motivated hacking. Distributed denial-of-service - and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017? Read More ▶ | In an era of constant likes and shares, where is the privacy line drawn? Are you someone who worries about being watched as you purchasing an item online? Or do you consider loss of privacy the price you pay for having the world at your fingertips. What category do you fit into? Read More ▶ |
| Wireless long distance control of your system. QWERTY with 92 keys, wireless keyboard with touchpad supporting multi-touch function, mouse left and right buttons, and easy copy/paste. Read More ▶ |
| Best practices to mitigate the risks of zero day vulnerabilities Read More ▶ |
| | If a CISO wishes to be effective in corporate America, should they play politics? Politics is a dirty word, especially in current times. Fake news, alternate facts, divisive tactics and shouting matches later, we have a new President. So what lessons can a CISO learn from this nasty world of politics? Read More ▶ |
| CSO explores the vulnerabilities and risks of automotive cyber-attacks and methods for securing your data, human resources, and the connected vehicle environment. Read More ▶ |
| Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment. Read More ▶ |
| White Paper: Lenovo Group Limited In today's mobile world it only makes sense that teaching and learning are no longer confined to the campus anymore. But to maximize the benefits of a mobile, connected campus, you need a solid plan and infrastructure. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|