Rash of data breaches forcing agencies to rethink how they verify employees’ identities
Joe Stuntz, a former policy lead for the OMB’s cyber and national security unit, said the future of identity management […]
Joe Stuntz, a former policy lead for the OMB’s cyber and national security unit, said the future of identity management […]
Called Meltdown, the first and most urgent flaw affects nearly all microprocessors made by Intel. The second, Spectre, affects most […]
With the booming market for voice-controlled virtual personal assistant devices like Google’s Home and Amazon’s Echo, and warnings from the […]
Security issues took a turn for the serious in 2017. This time around we still suffered the password breaches, malware […]
Discussions about “blockchain” technology seem to be everywhere these days, with potential applications spanning industries as diverse as banking, healthcare, […]
Government officials warn that software from Kaspersky Lab could be subverted by Russian intelligence. A security researcher shows how it […]
Nearly every web browser now comes with a password manager tool, a lightweight version of the same service offered by […]
When it comes to record management and customer notifications, the legal requirements for businesses are vastly different from state-to-state. Source: […]
A small health care provider such as a physician office or clinic often will contract with an IT services vendor […]
In this second installment of the No Boundaries series, we show how a long-known vulnerability in browsers’ built-in password managers […]
Two major roles within companies are increasingly coming under review for applicability within varying data protection requirements. The Chief Privacy […]
It doesn’t work to drop into a roomful of people you’ve never met before and have no connection to, spend […]