In light of the news that South Wales Police has been fined by the ICO for its DVD data breach,…
Browsing: Data Privacy
Researchers at Context Information Security have demonstrated how easy it is to monitor and record Bluetooth Low Energy signals transmitted…
The connected world is coming sooner than you think. App developers and mobile service providers are already taking advantage of…
The Internet of Things includes both traditional electronics and everyday “things” embedded with sensors, computing, and networking capabilities. Coffee Makers…
ADISA, the organisation that sets security standards around the secure disposal of IT Assets, has released new research into the…
More and more personal and business information worldwide is rapidly migrating into digital form on open and globally interconnected technology…
Kevin Bocek, Vice President, Security Strategy & Threat Intelligence at Venafi commented on weaknesses in cryptography used as part of the…
Secrets are pervasive in the high tech industry. For many years, members of this industry have been wary about sharing…
Cytegic DyTA intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow…
Fortune 100 social media analysis highlights FTC, SEC, FFIEC, FINRA and FDA regulatory issues and the need for more dynamic…