Ultimately, it’s up to app developers and platform owners to ensure that customer data is collected and stored in a way that meets current security standards. In cases where you can choose which ...
Who would have thought that daytime TV and enterprise IT security have so much in common? I confess that I've picked up a guilty pleasure: watching Maury-- the 20-year-old daytime talk show hosted by ...
VentureBeat recently sat down (virtually) with Jerry R. Geisler III, Executive Vice President and Chief Information Security Officer at Walmart Inc., to gain insights into the cybersecurity challenges ...
What is the best way to develop a cybersecurity strategy? Students in Northwestern Engineering’s Master of Science in Information Technology (MSIT) program learn that and more in Todd Fitzgerald's ...
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. This month, we shift our focus to an important security issue. We will combine some information ...
The COVID-19 pandemic has been a boon to cybercriminals, who are having a heyday exploiting people’s fears about the virus and the vulnerabilities in work-from-home (WFH) networks. It exposes major ...