From Dropbox to Twitter to WeTransfer and Salesforce, the use of cloud-based applications has become an everyday part of the…
Browsing: Data Privacy
In response to the news that Symantec has discovered a new crypto ransomware, which is affecting Australian computers and is…
CoroNet’s Enterprise Offering Helps Carriers, MSSPs and Device Manufacturers to Protect their Customers from the Fastest-Growing Cyber Threat CoroNet, a…
Statement from Kevin Bocek, Vice President, Security Strategy & Threat Intelligence at Venafi IoActive’s researchers have identified some new flaws…
The mobile security space is going to explode. According to Gartner, nearly 2.2 billion smart phones and tablets were sold…
Are your text messages and IMs safe? Given the knowledge of extensive government surveillance programs that are continually leaked, and…
In New ESG Study, IT Professionals Cite Escalating Security Vulnerabilities and Operational Issues; Say Securing the Browser is an Administrative…
Survey reveals that while usage is high, companies still not leveraging Office 365 for sensitive data A provider of dynamic, context-aware…
We live in a world where everyone expects instant, always-on access to information where if you haven’t already got ‘an…
To become a security analyst, you need specialized classes that aren’t often taken as an entry-level staffer. These classes will…