Banking institutions that are considering whether to accept virtual currencies, such as Bitcoin, must consider the risks involved, including money-laundering. Learn about the very latest Bitcoin developments.
A former systems administrator in the nuclear reactor department of an aircraft carrier is one of two individuals charged with hacking Navy computer systems and those at dozens of other government and commercial organizations.
Too many organizations have a device-centric BYOD policy that fails to look at big picture issues, including building a comprehensive strategy for protecting corporate information no matter how it's accessed, says Ian Evans of AirWatch.
As members of the workforce increasingly rely on mobile devices to access corporate data, secure sharing of files becomes more challenging, says Accellion's Vidhya Ranganathan, who describes an effective strategy.
On the day Target's CEO resigned in the aftermath of a massive data breach, the Ponemon Institute issued its 2014 Cost of Data Breach Study, which Chairman Larry Ponemon says helps explain why CEOs should be more involved in breach preparedness and response.
For too long, code writers have been measured on the features built into their applications - not the potential security vulnerabilities. It's time to change that perspective, says Maty Siman of Checkmarx.