During the economic downturn, there is at least one business sector that seems to be thriving. Unfortunately, it is mostly illegal, unethical and unpleasant.
Hacking generates huge volumes of data theft, but physical theft is a continuing problem that cannot be ignored.
The deputy director of the 19th Communications Squadron at Little Rock Air Force Base, Ark., recently put together some simple, low-tech advice to remind military personnel and employees of their responsibilities when online.
The Heartland Payment Systems breach shows what happens when the ethical component is removed from security.
The Veterans Affairs Department agrees to pay $20 million for exposure of personal data on millions of vets.
A breach in a social networking site can easily spill over into professional accounts and become a real security risk. A personal firewall in the way you do things can help avoid that risk.
Is the Common Weakness Enumeration Top 25 list a silver bullet for software security? No. But it is ammunition.
THE NEW FEDERAL chief technology officer might technically represent the government, but whoever gets the job will need to focus on a handful of critical areas.
Technology alone is not enough to secure sensitive personal data, but a new tool could help.
Hackers, spammers and phishers are exploiting the economic downturn by targeting social networking job sites.
Commentary: The incoming Obama administration has an opportunity to restore privacy safeguards in the government’s use of information technology.
The Federal Information Security Management Act is going on seven years old now and is due for a tune-up. Critics and advocates alike say the act, which focuses on process rather than technology, needs to move beyond a list of compliance check-offs to a more operational focus on risk management.
Cybereye'commentary: Failure to sell Block D means FCC has a second chance to get public safety network right.
Cybereye'commentary: Principles of detection
Cybereye'commentary: Final rules for Real ID cards don't put privacy, security concerns to rest