When ChatGPT hit the public in late 2022, it triggered a spate of references to Skynet. While it’s still a far cry from the dystopian surveillance neural network in the movie Terminator, it does pose ...
A data breach is an event that exposes confidential, private, or sensitive information to unauthorized individuals. It can occur due to accidental incidents or deliberate actions, and its consequences ...
Who would have thought that daytime TV and enterprise IT security have so much in common? I confess that I've picked up a guilty pleasure: watching Maury-- the 20-year-old daytime talk show hosted by ...
Ultimately, it’s up to app developers and platform owners to ensure that customer data is collected and stored in a way that meets current security standards. In cases where you can choose which ...
On October 30, 2023, the US Securities and Exchange Commission ("SEC") announced that it filed charges against SolarWinds Corp. ("SolarWinds" or the "Company") and its Chief Information Security ...
The importance these days of protecting your business from security threats is clear. But how to do it well often remains a vexing problem. Major IT vendors have faced this challenge like everyone ...
The past 12 months have been a trying time for cyber security professionals globally. Most notably, they’ve had to contend with a rise in cyber attacks linked to the war in Ukraine. At the same time, ...
In February 2024, Change Healthcare, a major medical billing and insurance processing company, was hit with a ransomware attack caused by stolen credentials and a lack of multifactor authentication.
I continue to be impressed with the changes coming in Office 2010 (currently in beta). Previously, I explained how Microsoft drew on real-world usage data to craft the beta suite’s updated UI.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results