Data and Information Security | News, how-tos, features, reviews, and videos
Explore related topics
Other big cloud providers already offer BYOK, but Google claims its option, available at no additional cost,is more comprehensive
They say the Senate's CISA cyber threat information sharing bill would allow businesses to share too much information
When collaboration moves to the cloud, security policy and controls must move into the documents themselves
Ashley Madison, Jeep, probably whatever smartwatch you're perusing -- there is no limit to where and when hackers can strike
In the wake of the OPM data breach, another grim reminder of the folly of hobbling encryption
Public keys, trusted hardware, block chains -- developers should use these tech tools to help secure the Internet for all
Digital watermarking of sensitive data can let organizations know immediately not only if it has been stolen, but where and how it is being accessed
Why can't politicians understand? Banning encryption is essentially no different than mandating backdoors
Comment period on Wassenaar ends Monday, and the rules as written would severely restrict sales, deployment, and research of cyber security tools and exploits