SafelightSecurity provides a few tips to help keep the business and personal data stored on your iPhone safe.
Browsing: Data Privacy
Richard Antsey discusses the benefits of using information rights management tools to protect your organizational data.
BYOD requires a security policy which is enforceable, realistic, acceptable to users and doesn’t violate personal privacy laws.
Recently security vendor McAfee released a piece of research which revealed that cybercrime costs the global economy £266 billion each year.
Information security needs to be considered at many levels, and vendors need to ensure they can protect their clients against a variety of threats.
With a few common-sense communication steps, organizations that implement employee monitoring can actually bolster and maintain employee goodwill.
In June of 2014, a group of hackers accessed and downloaded the personal information of over 600,000 French and Belgian Dominos customers.
TECHEXPO has announced the agenda for its New York City Cyber Security Summit set to take place on Thursday, September 18, 2014.
Phil Beckett, managing director at Proven Legal Technologies, considers the dangers of wiped smartphones.
The greatest impact has been by those educators that have inspired the individuals who then went on to do great things in information security innovation.