The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...
A top U.S. intelligence official on Thursday urged Congress to renew sweeping powers granted to American spy agencies to surveil and examine communications, saying...
Microsoft’s security patching machine hummed into overdrive Tuesday with the release of fixes for at least 97 documented software vulnerabilities, including a zero-day that’s...
Autonomy today unveiled a new, end-to-end, “meaning-based” platform designed to automate many time-consuming tasks law firms must deal with in order to manage documents...
Snooping, the unauthorized use of access privileges to view sensitive or confidential data within an organization, is on the rise according to Cyber-Ark Software’s...
As cybercrime continues to grow and become more complex, businesses must race to implement tools, technologies and strategies to protect their organizations.Frost & Sullivan...
Companies are often faced with tough decisions regarding policies on social networking use in the workplace. For many companies, social networking is becoming an...
In a letter published in the Washington Post this morning, Facebook CEO Mark Zuckerberg responded to the feedback and criticism surrounding the company’s privacy...
People want more privacy and protection as they communicate and spend time online. With several recent events causing concern across Facebook, Google, and other...
North Korean hackers working for the government stole virtual assets last year estimated to be worth between $630 million and more than $1 billion, U.N. experts...