Three major impacts when moving to a BYOD policy
Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …
Essential safe shopping tips
Based on Kaspersky Lab’s world-wide insight into malicious software and online scammers, the company offers the following 10 warnings and tips for online shoppers: …
Cyber Monday safety tips
AVG Technologies announces five tips to help consumers ensure secure online shopping. Whether from desktops, laptops, tablets or smartphones, these tips help consumers make …
Tips for a safe online shopping season
The holiday season presents the perfect opportunity for cybercriminals to steal consumers’ information as shopping is increasingly conducted online. According to a 2011 …
Free ebook identifies easy to manage network security vulnerabilities
nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …
Video: Why privacy matters
Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and …
PCI Council adds guidelines for data security risk assessment
The PCI Security Standards Council (PCI SSC) released the PCI DSS Risk Assessment Guidelines Information Supplement, a product of the PCI Risk Assessment Special Interest …
Tips for staying safe this Cyber Monday
Cyber Monday, one of the largest online shopping days of the entire year, is coming November 26. The National Retail Federation estimates that shoppers spent more than $1.2 …
12 scams of Christmas
A Harris Interactive study, conducted online among over 2,300 U.S. adults, investigates the online habits and behaviors of Americans, including those who indicate that they …
Can you trust the cloud?
Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that cloud security issues (84.4%) and cloud privacy and compliance issues …
How to stay secure in a changing world
In Sir Isaac Newton’s time there were three laws of motion, which dominated the scientific view of the world. While he, and his scientific peers, might have had many …
Best practices from healthcare and compliance experts
Data breaches in healthcare are raising alarm. Nearly 20 million patient health records have been compromised in the past two years, according to the U.S. Department of Health …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025