Feeling the Heat with Data Loss
Since heat is a natural byproduct of digital computation, why not use this electromagnetic emanation as a bypass for air-gap systems?
Since heat is a natural byproduct of digital computation, why not use this electromagnetic emanation as a bypass for air-gap systems?
Don’t let concerns over cloud security risks prevent your organization from reaping the benefits of cloud computing. Use this 8 step framework to secure your organization’s cloud adoption efforts.
Forget identity theft, an incident in Arkansas shows that plain old competition is behind at least some medical data theft.
Researches from the Singapore University of Technology and Design have developed a clever method to steal data from wireless printer networks that were otherwise assumed secure.
Organizations will need to match features to security mitigations in qualifying electronic health records systems.
These three misbeliefs are still causing problems for security programs today. Is your security strategy based on any of them?
In today’s business environment, the most effective way to keep company information secure is to focus on protecting the data itself, not the ever growing number of endpoint devices used to access it.
The Joint Chiefs of Staff is investigating a hack of their unclassified email server. Is that better than a hack of their classified email? Don’t be so sure.
The hack of married person “hookup” site Ashley Madison is just the latest evidence that we need to reconsider the rewards and the risks of data in our information economy.
A leak of patient health information through a cloud-based file-sharing platform contributed to a $218,000 HIPAA fine against a Boston hospital. Medicus emptor!