Security | News, how-tos, features, reviews, and videos
Healthcare is moving cautiously into cloud computing, virtualization, BYOD and other IT innovations. And there's good reason for the caution. Until an organization's IT leaders take meaningful steps to change what's typically seen as a
One iPad has simplified the workflow and the flow of water at a Massachusetts water treatment plant.
CIO.com blogger Constantine von Hoffman compiled and condensed all the painfully-obvious and self-serving 2013 cybersecurity-threat-prediction lists on the Web into a single tasty nugget.
What's in store for 2013? IT professionals need to be prepared for a mix of old (biometrics), new (3-D printing), borrowed (apps for watching TV) and blue (unemployed skeuomorphic designers).
To reduce cyber risk, itu2019s important to invest in a combination of people, process, and technology to stay a step ahead of the bad actorsrn
This week's IT security roundup has stories on some not-so-smart Facebook hackers; malware that infected hundreds of PoS systems in 40 different countries; "Project Blitzkrieg;" and more.
Facebook cooperated with the FBI to nab crooks who infected 11 million computers and stole $850 million. The bad guys clearly forgot just how strongly Facebook feels about other people making money off of its users.
Facebook is rolling out three changes to its privacy settings, activity log and photos. Here's what you need to know and how the updates to the social network affect you.
An information security officer recommends adding procedures for decommissioning devices to your BYOD policy before your BYOD employees upgrade to the latest smartphones and tablets this holiday season.
The FTC blasts app makers for misleading parents about their kids' privacy.
The upside for companies to protecting consumer data is practically nonexistent and the downside is barely any greater, according to CIO.com blogger Constantine von Hoffman. So why do organizations even bother?
Sponsored Links