| While many companies are cleaning up their client databases to comply with the new General Data Protection Regulation a.k.a. GDPR, other com...
| While many companies are cleaning up their client databases to comply with the new General Data Protection Regulation a.k.a. GDPR, other com...
| Arm this week announced the final slate of keynotes and technical sessions for Arm TechCon 2017. This year’s program will focus on how the t...
| Are your communications secure? There are many overhyped "cryptophones" and crypto software programs available today, but can you really tru...
| With nearly a billion people signed on, India has the largest biometric identity system in the world. The Aadhaar identity system requires c...
| The security of the internet remains rickety and now we're starting to hook up physical objects like cars, smart meters and home automation...
| In 2013 the Guardian was ordered to destroy laptops containing the Snowden documents under supervision of GCHQ. The British secret service i...
| A hack of the Certificate Authority (CA) DigiNotar has moved web browser providers to invalidate all its certificates. Including those authe...
| A string of internet security breaches over the last year have brought the discussion about cyber security to the public domain. At the Aspe...