The U.S. House of Representatives may vote on a controversial cyber threat information sharing bill this week, despite major privacy concerns from many digital rights Read More
IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other network Read More
Fear sells. Whether you’re hawking handguns or security software, scaring the bejesus out of your potential customer base is often a winning ploy. It’s no Read More
The Apple Watch isn’t due to hit the market until April 24, but many security professionals are already thinking about the security implications of the Read More
Among the features included with the GDR2 update for Windows Phone 8.1 is an anti-theft system that will make sure that your device is secure Read More
Scary stories of hacking Internet of Things devices are emerging, but how realistic is the threat? Last March, a very satisfied user of the Honeywell Read More
There are six words that no security or technology professional ever wants to hear: “We have a confirmed data breach”. Almost everything we do in Read More
Threat Horizon report The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the ISF (Information Security Forum) — Read More