Security features that Apple Inc. added to Leopard look great on paper, but in practice most are half-baked or useless, experts said today. And none of those features, good or bad, will make a whit of ...
New cybersecurity standards proposed by the North American Electric Reliability Corp. (NERC) to protect the nation’s power infrastructure are not broad enough and fail to cover a significant number of ...
Today's 2-Minute Tech Briefing covers the White House’s push to override state AI laws, renewed uncertainty in enterprise GPU ...
From spotting weapons and detecting smoke to predicting where incidents are most likely to occur, artificial intelligence is reshaping the future of physical security. In this episode of Today in Tech ...
Every security system, in the end, depends on people. Ideally, programs could be written with restricted privileges for operators so they would pose no threat – but I doubt it would work in practice.
What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, ...
Microsoft will launch Windows 11 on October 5, but not every PC will be eligible for an immediate upgrade. Rollout will last well into 2022 for machines that meet the necessary hardware requirements, ...
How much do cyberattacks cost? Recently, we reported on Clorox suing Cognizant for $380 million over alleged helpdesk failures during a cyberattack. We described how the complaint, filed in a ...
Author and philosopher Aldous Huxley once wrote, “The means determine the ends.” In other words, how we do something directly impacts the result. This is especially true when implementing security and ...
We meet Ian Mountford, a governance, risk and compliance consultant who transitioned into cyber security late in his career after being the victim of a hack. Ian talks about his rich and varied career ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results