Smartwatch sales could reach 100 million by 2020, with Apple leading sales in the market. The experts weigh in on vulnerabilities in smartwatch...
The reality of the Office of Personnel Management (OPM) hack and best practices for mitigating risk
TRUSTe's Ken Okumura talks about common security mistakes developers make, coding with privacy in mind, and how to find the right talent.
In defending their networks, security professionals regularly deal with the fog of war: the scarcity of data about events on their systems and...
From the Internet of Things to micropayments, here are five disruptive technologies that are about to have a profound impact on the enterprise.
Starting with secure design and testing, developers can create much more secure mobile app by improving in some key areas.
With the mobile app gold rush, unseasoned coders started resurfacing known vulnerabilities. Here are the four areas where mobile developers fail most.
A NETGEAR VueZone IoT failure took customers' security cameras offline. By testing for dependencies in the cloud you can avoid similar issues.
Employing cryptography is critical to your code's success. Fortunately, even if the algorithms are complex, the rules for implementation are simple.
Is it time to invest in IoT apps? The opportunity is real, but the risks are high. If you're an independent developer, start with limited deployment.

Pages