Please wait, you are being redirected to the web page requested.
If the page doesn´t load shortly, click here
Regulatory practices assume untrustworthy humans living in a reliable universe. People will be tempted to lie if they think the benefits outweigh the risks, but objects won't.
Varying amounts and types of residual data have been found on used mobile devices, hard disk drives and solid state drives purchased online from Amazon, eBay and Gazelle.com.
The question is on every CIO's and security officer's mind: What are the most efficient techniques to detect threats to cloud services?
Google’s new Android Marshmallow operating system offers important new security and ease-of-use features that improve its functionality for both enterprise and individual consumers.
The existence of a botnet comprising of tens of thousands of compromised routers and other IoT devices is not news. Nevertheless, this latest one is special, as it seems that its herder does not have malicious intentions.
Pen-testing drone searches for unsecured devices
The average cost of cybercrime escalates to $15 million per org
Wealth of personal data found on used electronics purchased online
Amazon launches AWS web application firewall
Top 5 Android Marshmallow enterprise security benefits