My Queue

There are no Videos in your queue.

Click on the Add to next to any video to save to your queue.

There are no Articles in your queue.

Click on the Add to next to any article to save to your queue.

There are no Podcasts in your queue.

Click on the Add to next to any podcast episode to save to your queue.

You're not following any authors.

Click the Follow button on any author page to keep up with the latest content from your favorite authors.

Security

Business Travel

Soon, Your Driver's License May Not Be Enough to Get You on a Domestic Flight

You may have to bring extra documentation to the airport depending on how your state is complying with new security standards.
Security

Meet the Bomb-Proof 'Fly-Bag' That Could Suppress an Explosion on an Airplane

The technology shows how a plane's luggage hold may be able to contain the force of a bomb.
Security

Children's Photos Among Data Stolen in Hack of Toy Maker VTech

A vigilante hacker's breach of 5 million accounts for the Hong Kong-based Internet-connected toy maker brings parents' worst nightmares into reality.
Security

EU Cracks Down On Bitcoin, Anonymous Payments Systems to Curb Terrorism Funding

EU interior and justice ministers will gather in Brussels on Friday for a crisis meeting in the wake of the Paris attacks.
Cyber Attacks

4 Types of Mobile Monsters and What We Can Learn From Their Horror Stories

System bugs wreaked havoc on mobile devices in 2015, but they could have been prevented.
Kids

How an 11-Year-Old Entrepreneur Is Helping People Create Safer Passwords

Sixth-grader Mira Modi is on a roll peddling Diceware passwords, and she says it's 'so much better' than being popular in school.
Data Security

5 Ways Your Employees Are Unintentionally Sabotaging Your Data Security

Your employees, even the ones that only have your company's best interest at heart, may unintentionally be making a series of critical mistakes that could put your data security at great risk.
Cybersecurity

Know Thy Enemy. Hire a Hacker to Enhance Your Cybersecurity.

Don't become a victim of a high-profile hack that could destroy your business for good.
Hiring

Effective Background Checks: 5 Factors to Consider

Sometimes a potential employee isn't all he or she seems to be. Proper screening is a must.
Paper

Paper Documents Are Potential Data Breaches Too

Crucial signed documents need special consideration in your overall security program.
Data Breach

Putting Your Business at Risk is a Communications Channel You'd Never Guess: Paper

Are you overlooking this risk factor, which last year caused 25 percent of federal agencies' security breeches?
Security

5 Steps to Securing Your Company Online From the Get Go

Security isn't a separate aspect; it must be considered in the development of every process.
Security

15 Million T-Mobile Customers' and Applicants' Personal Data Exposed in Epic Experian Hack

Victims' home addresses, birth dates and Social Security numbers could now be up for grabs on the black market.
Security

Rackspace Is Getting Into the Cybersecurity Business

If companies aren't concerned with security and compliance, they should be.
Data Breach

In Government Hack, the Number of Fingerprints Stolen Has Jumped to 5.6 Million

Hackers who stole security clearance data on millions of Defense Department and other U.S. government employees got away with about 5.6 million fingerprint records, some 4.5 million more than initially reported, the government states.