Big data analytics are useful for many things, but we need to think about their use when it comes to accessing people’s personal information.
Browsing: Data Privacy
As BYOD uptake continues to accelerate, companies must implement policies to handle security and privacy concerns before it’s too late.
Information security professionals have a unique opportunity to change the security industry forever by collaborating and championing privacy.
Experts from some of the leading companies in the information security industry comment on the recent iCloud hack.
John Walker discusses the need for security professionals and MP’s to rise to the challenge of curtailing the spread of child abuse images online.
It’s time to shift the conversation about PCI audits from pass/fail to considering smarter, more efficient methods of information security.
Proofpoint recently detected a Bitcoin credential phishing campaign that received a 2.7% click rate.
The latest eCustomerServiceIndex (eCSI) survey revealed that a majority of online shoppers surveyed asked for better online security.
Professor John Walker weighs in on what makes up a positive security culture and how it can be implemented successfully.
Blake Brannon of AirWatch by VMware has compiled five tips to help companies successfully implement a BYOD strategy.