With the launch of 2020, certain cybersecurity laws covering “smart” devices go into effect. As local (state) IoT cybersecurity regulation kicks in and federal regulation is looming, what does this mean for members of IoT ecosystems?
Facebook, no matter how hard they try to convince us, really doesn’t care about your privacy and it’s going to hurt Libra.
With the award of an important DoD clearance known as Level 6, Microsoft’s Azure cloud business became only the second to hold this important credential.
The Imperva data breach had serious consequences for CEO Chris Hylen, who has stepped down. This should get the attention of CEOs and senior leaders everywhere. Doing everything you can to create a business strategy with security at its core while also endeavoring to create a security first culture within the organization are business mission critical. Especially if you want to keep your job.
Adobe Creative Cloud vulnerability leaves 7.5 million customer emails exposed. The good news is that the misconfigured environment has been shut down. The bad news is that that’s 7.5 million users whose emails, and other information that could possibly be used by hackers, is potentially out there floating around.
Learn about the most common ways ransomware spreads and how you can protect your system from it.
Here’s a look at what characteristics differentiate the strongest cybersecurity programs from the rest and what they mean for all industries in general,
3D Sonic Fingerprint Technology from Qualcomm is quickly becoming one of the most secure technologies for mobile devices. Learn about this technology.
Generally speaking, your IT department is supposed to be your front line of security, but because of that IT professionals can potentially represent one of the greatest security risks of all.
It’s crucial that you know how to ensure email security for both your personal and work email accounts.