Related topics: security

Bypassing popular passwords

Every year computer security companies share their findings regarding passwords and data breaches. Again and again, they warn computer users to use complex passwords and not to use the same passwords for different accounts. ...

Creating a cloak for grid data in the cloud

Delivering modern electricity is a numbers game. From power plant output to consumer usage patterns, grid operators juggle a complex set of variables to keep the lights on. Cloud-based tools can help manage all of these data, ...

5G presents security challenge for telecom operators

While Washington's concerns that future 5G wireless networks could be vulnerable to spying by China have dominated headlines, businesses have long been pushing to make sure the technology is as secure as possible.

Two top executives leave Facebook PR team (Update)

Two of Facebook's top executives in its public relations team are leaving the company, stepping away after the most tumultuous period in the history of the social networking giant.

Self-driving cars and geospatial data: Who holds the keys?

As self-driving cars continue to develop, there will be plenty of data amassed through cars' navigational technologies. Questions regarding privacy, ownership, cybersecurity and public safety arise, as heavily guarded mapping ...

page 1 from 23