|
White Paper: Smarsh State, federal, and local government agencies need to keep important records (including digital communications) for a long time, to stay in compliance with public records laws, open meeting, Freedom of Information Act (FOIA), and various state sunshine laws. If an agency has email, social media, web and other digital communications related to business activities, records must be available to anyone who asks for them. Read More ▶ |
In a year marked by massive data breaches, trends report finds skimming and phishing made waves in 2016. Read More ▶ |
|
You may not have anything to hide, but do you really want some government agency peeking into your private digital life? I didn't think so. Read More ▶ |
|
Tired of conventional passwords? So is Nuance Communication, a tech firm that is promoting the human voice as a way to secure user accounts. Read More ▶ |
|
|
Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in order to attack the perimeter. Read More ▶ |
|
Several recent incidents involving U.S. President Donald Trump's administration can teach users something about IT security -- particularly about Twitter and what not to do with it. Read More ▶ |
|
Even after being given a new, secure device just before his inauguration, President Trump still reportedly uses his old phone. Read More ▶ |
|
Facebook beefs up its two-factor authentication with support for security keys over NFC on Android phones. Read More ▶ |
|
Modern technology could make connected cars safer than ever for drivers, but security from potential hackers is imperative. Read More ▶ |
|
CSO explores the vulnerabilities and risks of automotive cyberattacks and methods for securing your data, human resources, and the connected vehicle environment. Read More ▶ |
|
eGuide: Citrix Systems The mobile workforce is here to stay, but many IT organizations still lack a mobile security strategy that comprises both PCs and mobile devices-and the applications and data on those devices. As one of our writer's asks, what are these enterprises waiting for? Read More ▶ |
CIO Insider |
Editor's Picks |