Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.'s video game streaming site Twitch Interactive Inc. is requiring users to reset their passwords following a suspected hack.
NewsMost enterprise apps lack proper mobile security testing, according to a new research report. Even worse, 33 percent aren't tested for security at all, according to a new research report.
AnalysisDespite the daunting challenges businesses face, redesigning data privacy strategies can accelerate innovation, and lead to more educated and loyal customers, explains Intel Security Chief Malcolm Harkins.
Comments (1)
NewsWith Premera Blue Cross now the victim of a huge cyber attack affecting 11 million individuals—following Anthem’s attack that hit about 78.8 million—the justifications for not encrypting data at rest may quickly be evaporating.
NewsTwo senior U.S. senators demanded Anthem Inc. pick up the pace in notifying as many as 79 million Americans that their personal information may have been stolen from the health insurer in a computer breach last month.
NewsWith the two largest hacks in healthcare history reported this year, consumers might be wondering: Is health insurance under attack?
NewsHome health and hospice provider Amedisys is notifying more than 6,900 individuals of a breach of protected health information, even though the PHI is encrypted. Here's why.
NewsPremera Blue Cross suffered a hack last May, exposing claims and clinical data affecting 11 million customers, the Pacific Northwest and Alaska insurer has stated.
NewsBipartisan legislation to ease the sharing of cyber threat information among industries and the federal government has easily cleared the Senate Select Committee on Intelligence and now moves to the Senate floor for consideration.
NewsPrivacy advocates have objected to a bill scheduled for a Senate committee vote on Thursday that would shield companies from lawsuits when they share information about cyber-attacks with each other and federal agencies.
NewsSome banks have begun to make changes in how they activate customers’ credit-card accounts to use Apple Inc.’s new mobile-payment system after reports of fraudulent transactions, according to industry consultants.
AnalysisComplex investigations that gather data from personal devices and social media accounts can be “hit or miss.” Here are the ins and outs of real BYOD and social media investigations.
Please note you must now log in with your email address and password.