Where are we? We are all familiar with the concept of classifying data as public or private or strategic. (In...
Month: January 2014
Everything in this world, it seems, is becoming connected, from household appliances that “speak” to one another to drones that...
The demand for skilled security professionals will only grow The data breaches that took place in 2013 were game-changing in...
After many major breaches this year, it’s time to rethink 2014’s cyber defense with an eye on people, not products...
Will 2014 see a big uptick in the use of biometric technologies, strong encryption, a rash of new key technologies...