Don't be surprised if hackers make their presence felt on U.S. Election Day. Distributed denial-of-service attacks and high-profile leaks are among the tactics they might use if they try to influence Tuesday's vote. Read More ▶ |
|
| White Paper: Ping Identity Corporation Customers demand access anytime, anywhere. But if they feel their privacy is compromised they're gone. Customer IAM solutions require a balance. This guide provides 3 key features necessary to enable preference and privacy management. Read More ▶ | A hacker armed with a US$25 PCMCIA card can, within a few minutes, change the vote totals on an aging electronic voting machine in limited use in 13 U.S. states, a cybersecurity vendor has demonstrated. But some security experts questioned the timing of the video. Read More ▶ |
| Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 24th. All items are highly rated, and dramatically discounted. Read More ▶ |
| There are a million things to worry about but these chief security officers provide advice on how to start off on the right foot. Read More ▶ |
| | It's been just over a year since the roll out, but how much fraud has EMV really prevented? Read More ▶ |
| | The users of millions of faulty Samsung Galaxy Note7s face a another potential dilemma: The fate of their personal data on the devices. Read More ▶ |
| Trump or Clinton. Which of the 2 leading candidates is best from an information security perspective? Should a CISO prefer one over the other? Read More ▶ |
| White Paper: RSA Security Inc See how global organizations rate their cyber threat detection capabilities and how your organization compares. Then, discover how they plan to evolve their security technology and strategy in the future. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|