Employees at three overseas call centers sold hundreds of thousands of AT&T customer records, including names and Social Security numbers, to criminals who attempted to use the customer information to unlock stolen mobile phones,...
The U.S. government wants access to an alleged drug dealer’s emails, but Microsoft says, sorry, they’re in Ireland and out of bounds. This is what happens when we apply non-digital rules to digital situations.
In this eGuide, IDG News Service, Network World and Computerworld examine some of the latest trends in technology for finance departments and financial services companies. Read on to learn how these technologies are making a
Harvard Business Review explores why the C Suite and organizations must adapt to the changing landscape of their markets and how big data, organizational collaboration, and new cloud-based analysis technologies are driving successful
President Obama is unhappy with new rules from China that would require U.S. tech companies to abide by strict cybersecurity measures, but on Tuesday the country was quick to defend the proposed regulations.
In IT security, worst case scenarios became commonplace in 2014, and there’s no end in sight. Headline-making data breaches will likely continue into this year, as businesses, governments and regulators play catch-up to this threat.