Security | News, how-tos, features, reviews, and videos
If Dropbox wants to get into the kernel, they should open source their client side software so the community can audit their codern
Senior State Department official says cyber is fundamentally different than any sort of conventional military or diplomatic arena, urges ongoing and multilateral development of u2018normsu2019 in global Internet talks.
A new Princeton University privacy study suggests Google's user tracking tech is practically ubiquitous, and popular social network sites Twitter and Facebook are the next worst offenders.
The FCC should use a sensible approach that would not disrupt the current technology landscape and would allow consumers to make their own decisions on privacy
This Cybersecurity Awareness Month, we’re reminded that today’s cybersecurity landscape is rapidly evolving and advanced, proactive, and comprehensive security technology is not optional but essential.
Your data could be standing in the way of getting the most out of DevOps and continuous delivery. Itu2019s also a significant security risk in development u2014 and thatu2019s about to get more expensive
The CIO of construction company CDM Smith says his industry badly needs a transformation, and he believes technology will play a key role. Here's how.
Netflix says some of its customers use VPNs to access restricted content, so the company blocked the tech, raising questions about the ethical implications of location 'spoofing.'
We just experienced one of the most highly publicized and bizarre social media blunders ever during the 2016 NFL Draft. A strategic CIO, thinking about social media and the long-term security of his or her company or organization, should not see draf
"Your machine is insecure unless you're running my kernel," says Greg Kroah-Hartman.
Sponsored Links