Sensitive Information in big data environments rises to 50%, IoT 33%.
Read MoreExploit kits evolved with alarming speed, heightened stealth and novel shape-shifting abilities.
Read MoreTheft of identities and personal information retains top spot, accounting for 53% of data breaches; healthcare and government overtake retail as most-targeted sectors.
Read MoreThe prpl Foundation is demonstrating how an open, hardware based approach provides an ideal foundation for securing Internet of Things (IoT) and other connected embedded devices.
Read MoreGemalto is launching a leading edge M2M Category 1 (Cat 1) LTE wireless module. This advanced module enables fall-back to 2G in Europe Middle East Africa and to 3G in North America for areas where LTE connectivity is not yet fully available.
Read MoreThe recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.
Read More