Most security vulnerabilities result from ordinary coding errors. What does this mean for the prospects of more secure software?
Read article ... Read More »
If your organization uses email, you have a phishing problem. As phishing continues to evolve, what’s your organization doing to stay off the hook?
Read arti... Read More »
Internet-connected toys provide an often-overlooked avenue for breaching personal data, especially of those most vulnerable. Government and private measures can... Read More »
A provably secure timestamping system could be achieved by combining the trustworthiness and accuracy that comes from having a set of trusted centralized timest... Read More »