Cpl. Howard Vosburg, of the Massachusetts Army National Guard, scans the crowd for possible threats at the 2011 Boston Marathon. (U.S. Army photo by Sgt. Jerry Saslav/Massachusetts National Guard ...
A data breach is an event that exposes confidential, private, or sensitive information to unauthorized individuals. It can occur due to accidental incidents or deliberate actions, and its consequences ...
The importance these days of protecting your business from security threats is clear. But how to do it well often remains a vexing problem. Major IT vendors have faced this challenge like everyone ...
Who would have thought that daytime TV and enterprise IT security have so much in common? I confess that I've picked up a guilty pleasure: watching Maury-- the 20-year-old daytime talk show hosted by ...
Ultimately, it’s up to app developers and platform owners to ensure that customer data is collected and stored in a way that meets current security standards. In cases where you can choose which ...
I continue to be impressed with the changes coming in Office 2010 (currently in beta). Previously, I explained how Microsoft drew on real-world usage data to craft the beta suite’s updated UI.
The theme of the RSA Conference this year is resilience, which applies well to the security industry as well as society as a whole. Both had to adapt to previously unknown, persistent threats over the ...
The past 12 months have been a trying time for cyber security professionals globally. Most notably, they’ve had to contend with a rise in cyber attacks linked to the war in Ukraine. At the same time, ...
2020 started with COVID-19 and a pell-mell shift to remote work, and finished with the gut-punch of a major breach that put hundreds of organizations into frantic assess-and-remediate mode. The year ...
VentureBeat recently sat down (virtually) with Jerry R. Geisler III, Executive Vice President and Chief Information Security Officer at Walmart Inc., to gain insights into the cybersecurity challenges ...