Security tagged posts
Shadow IT is a great thing until it runs into the security of cloud computing...Read More
Here’s how to minimize your personal data footprint when messaging, on social media, and using mobile appsRead More
Privacy is under attack from all quarters, but even today, there are things you can do to protect your personal data. Here are some tips.
Who says privacy is dead? While it’s true that mar...
2015 security predictions: IoT attacks to join cloud breaches and ransomware
Summary:Think 2014 has been a bad year for security, with high-profile cloud breaches and system hacks? Well, things aren’t going to get any better in 2015.
Why Effective Computer Security Means Covering All Your Bases
By David Needle
LinkedIn’s head security honcho shares his proactive security strategy, which begins with everyone buying in.
PALO ALTO, Calif...Read More
9 top threats to cloud computing security
Cloud computing has grabbed the spotlight at this year’s RSA Conference 2013 in San Francisco, with vendors aplenty hawking products and services that equip IT with controls to bring order to clo...Read More