Steven Mnuchin, a former CIO and executive vice president for Goldman Sachs, told senators on Thursday that he is “very concerned about the lack of first-rate technology at the IRS” as well as staff cuts in recent years.
Microsoft’s lawsuit objecting to the indiscriminate use by U.S. law enforcement of orders that demand user data without the opportunity to inform the customer may run into questions about the software giant's standing to raise the...
President-elect Donald Trump has turned over the Android phone he used for tweeting and will use a more secure phone with encryption capabilities that was approved by the Secret Service, according to news reports.
How much are you really paying for endpoint security? Learn two distinct endpoint protection strategies, which capabilities are critical, and what the true cost of a typical enterprise endpoint protection deployment is, including
The Central Intelligence Agency updated rules relating to the collection, retention and dissemination of information on Americans, including putting a limit of five years on holding certain sensitive data and introducing restrictions...
This paper aims to describe and deconstruct two distinctly diferent yet often confused types of attacks: Exploits and Malware. Though the diferences between these vectors of attack are significant, there are many scenarios where
A cloud of 3D-printed drones big enough to bring down the latest U.S. stealth fighter, the F35, was just one of the combat scenarios evoked in a discussion of the future of warfare at the World Economic Forum in Davos, Switzerland.