Once again, hackers have reminded Uncle Sam that he is not impervious to cyberattacks. This time the targets were none…
Super Bowl 50 is almost here. For months, legions of fans from around the world have been clamoring for tickets…
The White House announced a comprehensive plan on Feb. 9 to strengthen the nation’s cybersecurity, protect America’s privacy and safeguard…
This week, President Obama released his Cybersecurity National Action Plan which proposes an increase in federal cybersecurity spending to almost…
At any given moment, hackers are hard at work trying to make a quick buck. Anything that sells fast on…
We recently partnered with MediaplanetUSA in their just released Data Security campaign which seeks to raise awareness of pressing cybersecurity…
Hackers were prolific in 2015. According to the Identity Theft Resource Center, there have been an estimated 750 breaches this…
Last week, Jason Soroko, manager, security technologies for Entrust Datacard was featured by SecureID News as part of their 2016…
In early 2015, the Washington Post quite accurately referred to 2015 as the “year of the health care hack,” and forecast…
Shadow IT can be loosely defined as the incorporation of any information technology introduced into an organization that is not…