Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals ...
Security breaches are a given in higher ed, but colleges and universities can better thwart attacks by implementing the right training, processes and technologies. Storing vast amounts of student ...
The Security in Touch: Exploring Digital Security on Windows 8 infographic tackles how people are adapting to the many devices they use. It’s like people use these devices, such as smartphones and ...
Jimmy is a writer and editor who publishes a weekly newsletter. You can find him on Twitter. Are passwords dead? According to Wired's Mat Honan, they ought to be ...
A data breach is “the unauthorized acquisition of covered information that compromises security, integrity or confidentiality," according to software company Digital Guardian. While all 50 states have ...
Purchasing a home security system once required having a technician come into your house to punch holes in your walls, then snake wires to every door and window ...