Security | News, how-tos, features, reviews, and videos
A debate is raging over what to call a new breed of security software -- User Based Analysis or Active Breach Detection. Call it what you will, writes Rob Enderle. Just donu2019t be the one to name it.
Rather than seeking to undermine data security for everyone except itself, the government should ask companies to follow its own example u2013 use strong encryption when it is needed.
As organizations grapple with new cybersecurity challenges, the need for an efficient, effective, modern-day SOC is imperative.
I am a huge fan of the Nest Thermostat, but Nest Cam doesn't measure up
Tech chiefs come together to sift through security issues, ranging from cybersecurity to budgets to CISO roles.
Today, there's a tradeoff between user privacy and the effectiveness of artificial intelligence (AI) apps such as Siri and Google Now. Apple's strong privacy stance may drum up kudos from consumers but also give Google a technological advan
Samsung readies fix for a security flaw that may have compromised as many as 600 million phones, including the Galaxy.
Are you really doing all you can to catch data thieves and prevent security breaches? Columnist Rob Enderle says if you havenu2019t deployed a user-based analytics program you are not doing all you can.
Companies that use wearables as part of their workplace wellness programs may soon have to answer to the U.S. government about how they use the data they collect from employees.
Sponsored Links