Tag:

Privacy

Latest Headlines

Latest Headlines

With 50B connected devices, the security challenges can seem insurmountable

With the proliferation of machine-to-machine (M2M) devices and connections, some estimates putting the number as high as 50 billion devices by 2020, security pros are trying to come to grips with the security implications of all those endpoints.

'Soft' benefits of BYOD getting harder to justify in face of 'hard' costs

The "soft" benefits of BYOD, such as increased employee satisfaction and productivity, can be hard to justify to CEOs in the face of clearer evidence that BYOD programs can cost companies money.

Consumers fear wearables privacy loss, unless the price is right

Wearables seem to be all the rage on tech media catwalks, but not so much with the general public. The problem: concerns about privacy. Still, offer consumers coupons or discounts, or help them with health and lifestyle maintenance, and you're half way there.

Wearables in the workplace? Think BYOD

Enterprises need to begin crafting policies in order to harness the productivity benefits of wearables while ensuring that sensitive data is secure and privacy rights protected. These policies should be based on existing BYOD policies, yet take into account some of the unique attributes of wearables.

Wireless smart meters criticized for invading privacy, starting fires

Smart meters, which enable utilities to communicate wirelessly with home energy systems, are being criticized for invading home owners' privacy and, in some cases, starting fires.

News Scan: NSA spying fallout worse than first thought; Consumers await word on Supervalu breach severity; more.

The top news stories for August 20, 2014.

Spotlight: Wired on the real Edward Snowden story

James Bamford's one-on-one interview with Edward Snowden.

Forrester cuts its IT spending forecast in half; 20% of computers could be malware breeding grounds; More

The top news stories for August 14, 2014.

Why the Blackphone hack at DEF CON was way overhyped

The Blackphone, a smartphone offering encrypted communications (phone calls, browsing, email, text), made headlines at last week's DEF CON conference in Las Vegas. Unfortunately, most of those headlines were inaccurate.

Choosing BYOD vs. CYOD? The path to both is secure data

Whether your organization is embracing a BYOD or a CYOD program, ulitmately what are most important are the steps you take to secure company data. Here are some steps on how to do just that.