For years, the U.S. Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. However, after minimal corporate adoption of stronger cybersecurity, the...
An IT security certification can provide a key boost for your career, but with so many different certifications available (and so many organizations more than happy to take your money for training a...
Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats.
While cryptology is thousand...
The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe.
But that spending surge has brought with it a co...
In an age of strong data privacy laws like GDPR and CCPA, data loss prevention (DLP) technology is becoming a critically important IT security tool.
Every organization has data, and some of that da...
Users may believe that when they delete a file on their hard drive, the document no longer exists. However, IT professionals understand that the data itself may remain.
Yet even experienced IT prof...
How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive recertification rack w...
Businesses that have spent the past three-plus years adapting to the European Union’s far-reaching data privacy law now have to decide how they will respond to a similar law in China that has been cri...
IT asset management (ITAM) used to be purely about inventorying what hardware and software assets were scattered about the enterprise. However, the needs of cybersecurity now require that they also of...