IT must patch against Total Meltdown now: The source code is on GitHubA patch for Meltdown created an even bigger flaw for 64-bit Win7 and Server 2008 R2. Now, it's freely available.April 26, 2018 by Conner Forrest in Security
MinerEye launches AI-powered Data Tracker to bolster GDPR complianceThe tool can also help save on costs by identifying redundant data and making suggestions for mitigations.April 12, 2018 by Conner Forrest in Security
Vendor selection: What needs to be in a good policyProper due diligence when conducting a security audit with vendors can pay dividends for your organization.April 3, 2018 by Conner Forrest in Security
Ten best practices for securing the Internet of Things in your organizationA successful IoT deployment must consider proper cybersecurity at the outset. Here are some IoT security tips to get you started.June 1, 2017 by Conner Forrest in Security
Understanding the military buildup of offensive cyberweaponsOver the past few years, offensive cyberweapons have risen in prominence as a part of international military efforts. The full impact of these weapons remains to be seen, however.September 1, 2016 by Conner Forrest in Security
The state of mobile device security: Android vs. iOSAndroid or iOS is one of the biggest decisions you'll make for your company, especially regarding security. Here are the latest security updates from both ecosystems.July 11, 2016 by Conner Forrest in Security
Understanding the dichotomy between single-use and multifunctional tabletsTablets are growing as a core enterprise tool, but they aren't replacing laptops. Here are the different ways they're being used to get work done.July 1, 2016 by Conner Forrest in Security
The rise of IoT hacking: New dangers, new solutionsThe explosive growth of the Internet of Things has created a host of new threats for the enterprise. Here's how hackers are targeting your connected devices and what you can do about it.March 9, 2016 by Conner Forrest in Security
Why the connected car is one of this generation's biggest security risksHigh-profile hacks have led many to question the growing connectedness of today's automobiles. The risks are real, but the response is currently more talk than action.March 8, 2016 by Conner Forrest in Security
How IoT is changing enterprise securityThe rise of the Internet of Things has brought a whole new set of security challenges. Here's what tech decision makers need to know about how IoT is changing security in the enterprise.February 2, 2015 by Conner Forrest in Security