An identity theft service that sells Social Security numbers, birth records, credit and background reports on millions of Americans has infiltrated computers at some of America’s largest consumer and business data aggregators
Author: ISBuzz Team
In my post on Measuring and Reporting on Vulnerability Risk, I talked about how rankings and categories make for some easy to understand graphs, but they tend to fail at meaningfully measuring progress over time.
Infamous US spy agency the NSA is looking to appoint a Civil Liberties & Privacy Officer.
Just as a former member of Anonymous accuses the United States government of coercing hackers to do their dirty work in America’s cyberwars, the sentencing hearing for the group’s alleged ex-ringleader has been mysteriously delayed yet again.
Think back to all of the corporate training you’ve sat through during your career. Chances are (especially if you’ve worked at a large enterprise), that some of that training had little relevance to your job duties.
LONDON (UK), XX September 2013: Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade shows
It’s no secret that the Kindle Fire is toted by many of its owners into the workplace, but Amazon is taking a more proactive role in encouraging that trend with the release of Fire OS 3.0.
Google’s decision to phase out a late 1990s plug-in technology from Chrome was praised by experts as the right move to bolster browser security.
Social media has become a top target of hackers and mobile devices are expanding that target, IBM reported on Tuesday in its X-Force 2013 Mid-Year Trend and Risk Report.
Organizations have implemented bring your own device (BYOD) policies for even better business productivity, and employees are enjoying the perks of being able to work outside the office space if desired.