New research explores the hidden costs of mega breaches.
A report by a UK government body worked out that the average cost rose for both large and small businesses with the overall trend showing that attacks in fact decreased.Read more: http://www.itproportal.com/2014/04/30/cyber-attacks-cost-uks-large-organisations-average-1m-attack/
The “Year of the Hack” will probably be one way that 2014 will be remembered. But it actually began in 2013 with a phishing email. There are clues to how hacks that began in 2013 (some even earlier) continue to reverberate, even as we begin into a New Year. Read More
YC-backed Cymmetria, which is uncloaking from stealth now after around a year working its cyber security startup business,
Breaches happen the way Hemingway said you go bankrupt: gradually then suddenly.
Following the massive data breach that saw as many as 70 million Target customers’ personal information stolen, along with 40 million credit and debit cards,
The finishing touches of the European Union General Data Protection Regulation (GDPR) are underway, and with it, many international companies that have data passing through the EU,
Rising security risks and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions. So how can you choose a solution that works?Read more: http://www.itproportal.
The Sony hack has taught us so much. It’s taught us to send corporate email as if everyone is reading those emails. It’s taught us that people in Hollywood are just as mean as people in any other industry (and potentially racist).
Editor’s note: Yoav Leitersdorf and Ofer Schreiber are partners at YL Ventures, which invests early in cybersecurity, cloud computing, big data and Software-as-a-Service software companies.This year we witnessed a series of high-profile security breaches,
The EU's Data Privacy Act is expected to reach final agreement in 2015 and will require many companies to overhaul the way they store and transfer information. Are you ready? Read more: http://www.itproportal.com/2014/08/27/eu-data-protection-directive-how-to-minimise-your-financial-risk/
Proposed Internet regulator would hold tech giants accountable for content published on their platforms.
Salesforce users can now obtain valuable data and insights with only their voice.
Half of UK employees working remotely feel pressure to prove their working.
Could technology and data analytics be used to improve not only the workplace but also an organisation's employees?
As our identities become increasingly digital, protecting them from cyber threats has never been more important.
The soft skills learned at a liberal arts college actually translate quite well to the field of IT.
Victims are usually clueless they're being attacked.
ERP systems provide retailers with the features and functionality needed to process drop shipping orders efficiently and effectively.
Below are a few key tactics manufacturers can use to ensure the transition to car sharing services is as smooth and profitable as possible.
Over the years, there have been a number of food scandals that have rocked consumer confidence in the food industry.
今日下午，360 召开了关于 360 安全路由发布前的媒体交流分享会，公布了即将发布的路由配置： 企业级 AR9344 533MHz 处理器，128 RAM，802.11AC 并支持 2.
人人都羡慕过那些优雅地弹着钢琴的大触，可惜这技能并不是想学会就能学会的。谷歌眼镜的负责人 Thad Starner 日前又弄出了一样超科技 —— 一双能够让你学会弹钢琴的手套。
The Ice Bucket Challenge has wended it’s way around the world and is now gradually hitting the European tech startup community. After a little encouragement from my own attempt the duly nominated Alicia Navarro,
唔知點解有咁多人鍾意虐待 iPhone 6 Plus，例如較早之前用攪拌機攪碎該款新手機的 RatedRR，其實同時亦進行了一項實彈射擊測試。咁到底這部 iPhone 6 Plus 最後又可唔可以幸免於難呢？以下有更多資料：The post 又有片睇！
调研机构Net Applications近日针对市场上的操作系统和浏览器进行了一系列调研。操作系统调研数据显示 […]