Related Content
Evaluating Your Risks before Moving Data to Cloud Storage When companies move services to the cloud, security concerns don't disappear by transferring management to the cloud service provider. It's smart to familiarize yourself with what security controls the service provider has in place first, and to have ways of auditing those protocols as you proceed. |
||
Let’s Stop the Password Madness People and organizations definitely should take security seriously. That said, some of the “experts” advising about password security are going too far. Frequent password changes give the appearance of more robust security without actually affecting anything. Payson Hall unpacks this requirement. |
||
Apple Pay's Security Concerns Holding It Back Apple Pay might be simple and easy to use, but the number of people in the US who distrust mobile payment systems due to the degree of personal information that needs to be shared increased by 9 percent year-over-year, bringing it to 35 percent. Security issues are holding the app back. |
||
Mobile Users Eager to Share Data, but Require Security and Ownership The Microsoft Digital Trends 2015 report shows that people’s attitudes toward digital and connected devices have changed significantly since just two years ago. Previously, users wanted to be more anonymous. Now, the idea of putting yourself out there isn’t nearly as frightening. |
||
The Cloudy Identity Theft Crisis Every day seems to bring yet another massive identity theft news story. Who is actually responsible for maintaining the security of a person’s data in the cloud? Most consumers assume it is their responsibility to protect their account information and precious sensitive online information. |
||
Predictive Policing Is on the Rise Traditionally, technology has been used in a reactive way to address a crime after it has happened. Recently, there's been a proactive trend towards predictive policing—especially through efforts by software giants such as Microsoft—to potentially curb a crime before it even happens. |
||
Report: Connected Cars Have Weaker Security Than We Thought Today's connected cars offer many technological conveniences. But with those features come some risks. The Wi-Fi, Bluetooth, and cellular connections in these cars can fall prey to hacking attacks, which can jeopardize people’s physical safety and private information—and the security is pretty lax. |
||
Businesses Cash In on Open Government Data Access to data is becoming increasingly obtainable through open data projects that are now available globally, often sponsored by governmental bodies. For example, many real estate websites leverage federal housing data to power their information. How else can we benefit from open government data? |