Gilbert noted that consumers now live in a world in which consumers almost never actually own anything that contains software....
Technology Management
The report outlined the following five IT concerns as the top factors that are keeping IT professionals up at night:...
Sometimes the best way to secure customer data is not to collect it in the first place. While it can...
Two years after the data breach, which began on May 13, 2017, and the company discovered and began remediating on...
Risk management VP Elizabeth Queen told CNBC the company is working "around the clock" to restore service. Link
“A successful pretexting attack on senior executives can reap large dividends as a result of their – often unchallenged –...
Half a billion records have been exposed in total, with over 86 breaches affecting the two states since January, according...
Don't call back phone numbers that ring once and hang up, the Federal Communications Commission (FCC) has warned. Link
That research claims that “despite significant cybersecurity investment in many areas, there has been very limited improvement with the largest...
Whether your entire business gets hit by a natural disaster or your IT system gets attacked by malicious physical damage,...