Articles
Recent research suggests that the number of vulnerabilities in cloud containers is increasing, creating security headaches for enterprises.
Continue reading...
Whose job is it to identify, assess and react to risks? If you responded with anyone other than management, read on.
Continue reading...
Algorithms that have been trained improperly or structured using inappropriate scoring methods can turn out outrageous and offensive results.
Continue reading...
IoT developments in 2015
Continue reading...
Remember the good old days of open source, when your main concern was whether you might have inadvertently violated a license or piece of intellectual property? And if you did, well then at worst you'd have to turn over a piece of that software code to the open source community?
Continue reading...
Think your organization is safe if it minds its own security? Think again. You’ve also got to worry about security at all those companies you associate with, from suppliers and consulting firms to PR agencies, systems integrators, event planners and even heating and cooling vendors.
Continue reading...
You hear a lot about Shadow IT these days. And we'll probably continue to hear more, according to Cameron Coles, senior product marketing manager for Skyhigh Networks, a cloud security company.
Continue reading...
Jumpin' Jehoshaphat, Batman! Looks like Microsoft is defending email privacy. This, after it confirmed over the weekend that it would not be handing over email data to US federal regulators.
Continue reading...