Ten best practices for securing the Internet of Things in your organizationA successful IoT deployment must consider proper cybersecurity at the outset. Here are some IoT security tips to get you started.June 1, 2017 by Conner Forrest in Security
The rise of IoT hacking: New dangers, new solutionsThe explosive growth of the Internet of Things has created a host of new threats for the enterprise. Here's how hackers are targeting your connected devices and what you can do about it.March 9, 2016 by Conner Forrest in Security
The state of mobile device security: Android vs. iOSAndroid or iOS is one of the biggest decisions you'll make for your company, especially regarding security. Here are the latest security updates from both ecosystems.July 11, 2016 by Conner Forrest in Security
MinerEye launches AI-powered Data Tracker to bolster GDPR complianceThe tool can also help save on costs by identifying redundant data and making suggestions for mitigations.April 12, 2018 by Conner Forrest in Security
Play VideoVideo: Why some of the biggest companies in the world are now investing in blockchainPaul Gaynor, global technology and alliance consulting leader at PwC, spoke with ZDNet about the growing adoption of blockchain distributed ledger technology.November 22, 2017 by Conner Forrest in Security
Play VideoVideo: Understanding the increase in cyberattacks against critical infrastructureFrom Stuxnet to Ukraine, hackers are ramping up attacks against infrastructure such as energy grids. Forrester's Merritt Maxim explained who is behind the attacks and what weapons they're using.November 16, 2017 by Conner Forrest in Security
Play VideoWhy the true value of blockchain may be 20 years awayMartha Bennett, principal analyst at Forrester Research, spoke with ZDNet about the current capabilities of blockchain, and why it may be a long-term investment for businesses.November 30, 2017 by Conner Forrest in Security
Why the connected car is one of this generation's biggest security risksHigh-profile hacks have led many to question the growing connectedness of today's automobiles. The risks are real, but the response is currently more talk than action.March 8, 2016 by Conner Forrest in Security
IT must patch against Total Meltdown now: The source code is on GitHubA patch for Meltdown created an even bigger flaw for 64-bit Win7 and Server 2008 R2. Now, it's freely available.April 26, 2018 by Conner Forrest in Security
Understanding the dichotomy between single-use and multifunctional tabletsTablets are growing as a core enterprise tool, but they aren't replacing laptops. Here are the different ways they're being used to get work done.July 1, 2016 by Conner Forrest in Security