data security

“If you’re an American, your information probably was exposed," said the researcher who found the breach.
Protect non-computer information. Your paper-based files, bank statements, passport, and credit card statements provide ample
Around this time of year, I'd rather focus on family and fun than identity protection, security, and taxes, but as they say
As more organizations here in North America and overseas increasingly utilize third party vendors with a global presence to perform critical functions, process key transactions and provide exposure to sensitive proprietary information, those organizations with mature third party risk (TPR) programs are receiving a loud call to provide assistance to those new to the TPR field.
You can't be overly cautious when it comes to protecting yourself against scammers, it seems every advance in identity theft
Hackers are waiting to pounce when companies bring their internet and phone infrastructure to the cloud. Cloud security is
The numbers are more sobering than surprising. For years now, RAND researchers have documented the growing threat posed by
Whether we're talking about college kids coming home for a few months or simple relocation, there's nothing relaxing about a move -- or simple. Get it wrong, and you become vulnerable to identity theft and other forms of fraud.
And they raise pressing questions we should consider today as we lay the groundwork for a secure information technology environment
Most of the requests came from the U.S. and India.
The encryption debate returned to Congress on Tuesday.
It's still not certain that the Email Privacy Act will become law.
Political campaigns are usually on tight budgets and are much more focused on campaign mechanics than cybersecurity, which to them feels like something outside their realm of expertise, so they spend little time thinking about what's happening to their data.