By John Reed Stark2015-10-14T10:15:00
Though data breaches are inevitable, companies still remain too focused on fortification rather than response, failing to adopt to the harsh realities of rapidly emerging international and multifarious cyber-security threats. Inside, columnist John Reed Stark recommends a three-step cyber-security transformation for companies to undertake to combat recent rapidly evolving cyber-dangers.
2015-12-08T09:00:00Z By John Reed Stark
Penetration testing is the exercise of testing a company’s cyber-security defenses, and finding the right “pen tester” to do that can be difficult. Learn how to find the right blend of capable, trustworthy, and innovative cyber-security professionals. More inside.
2025-09-09T21:29:00Z By Adrianne Appel
Google allegedly collected personal data from mobile devices without permission, violating California privacy laws, a jury ruled in awarding more than $425.6 million to class-action plaintiffs.
2025-09-04T18:49:00Z By Ruth Prickett
The EU has one, the U.K. is getting one, many U.S. states are working with Google and Apple to provide one, and now industry sectors are developing their own digital wallet.
Site powered by Webvision Cloud