Eye Don’t Know About This Iris Scanning Thing
Like PKI and Linux on the desktop in the last decade, it seems as though biometrics have become this decade’s promising technology that never really fully delivers on its promise.
Like PKI and Linux on the desktop in the last decade, it seems as though biometrics have become this decade’s promising technology that never really fully delivers on its promise.
Part 5 of our Top Challenges of GDPR series provides tips for implementing a key requirement of GDPR: privacy by design and default.
Part 5 of our Top Challenges of GDPR series provides tips for implementing a key requirement of GDPR: privacy by design and default.
This is the twelfth installment in our How-To series: an ongoing set of product posts full of tips and tricks for gett
This is the twelfth installment in our How-To series: an ongoing set of product posts full of tips and tricks for gett
19 security professionals and business leaders share their top tips for protecting unstructured data.
Learn what the top security initiatives companies are looking into and 5 things your organization needs to implement for GDPR compliance.
The WannaCrypt ransomware was nothing special. Companies were done in by nasty software exploits and endemic insecurity in the form of unpatched and unpatchable legacy systems.
In many ways, WannaCrypt is just another ransomware variant — but then in many ways it isn't. Here's what makes WannaCrypt unique and the lessons we can take from these attacks.
The WannaCry ransomware outbreak that emerged last week and is exploiting a vulnerability discovered and hidden for an unknown amount of time by the NSA is arguably the worst ransomware we’ve seen thus far. It’s not just encrypting files and locking users out of their machines, but it’s also self-propagating and uses exploit code, behavior that hasn’t been seen in ransomware until now.