Revelations about the National Security Agency surveillance programs are hurting U.S. business abroad, says a new report.
Earlier this month, officials of the Tor anonymous network uncovered an attack campaign that could have unveiled the identities of users of Tor hidden services, which hide a user's IP address.
A federal appeals court has agreed to consider the question of whether the Federal Trade Commission has the authority to sue companies for lax IT security that leads to data breaches.
Wearables are better suited to a fast-paced workplace than smartphones, argues Jared Banyard, Android developer at Lua.
Delaware companies will be required to destroy personal information of consumers when that information is no longer required to be retained, according to a law that takes effect Jan. 1, 2015.
While data lakes are being marketed as a key part of any big data solution, they could pose security and regulatory risks to the enterprise.
While mobile device penetration in Europe is high, European firms remain reluctant to allow BYOD. Surprising, employees are the ones holding back BYOD.
Australia should enact a mandatory data breach notification law, recommends an interim report on the country's financial system by the Treasury.
The Information Commissioner's Office, the U.K. agency in charge of enforcing the country's data protection and privacy laws, has suffered a data breach, but released few details.
An advisory group set up the National Institute for Standards and Technology to examine revelations about the National Security Agency's involvement in the NIST encryption process is warning that NIST must be able to reject NSA "advice" about cryptography "when warranted."