Author: WTN News

Cybercriminals use sophisticated technology to rake in millions of dollars in scammed and stolen money across the globe, and cost their victims millions more to clean up the messes they leave behind. When police try to break up these online rings, they find a whole...

Net-A-Porter didn't know how much money it was leaving on the table when the Web site failed to keep up with traffic. New microservices captured it. Luxury fashion might seem to be an unlikely space to suffer from sudden onslaughts of high traffic, given the non-mass...

The first mistake companies make while trying to protect their digital assets is to believe they can be secure. “Forget aspiring to full protection. Hacking is black magic engaged in by a ton of bad guys from Russia to Romania whose citizens do not necessarily...

Wearables are now a significant part of corporate wellness and remote patient monitoring programs. However, long-term investment from seniors remains a challenge, despite an increasing need for seniors to have better healthcare options. Garmin and Tactio Health Group, two major companies involved in telehealth and...

State of Wisconsin CIO David Cagigal and CISO Bill Nash offer pointers on how a strategic CIO-CISO partnership can help drive and prioritize cybersecurity. They enumerate the elements that help drive an optimal CIO-CISO partnership and offer pointers on how to evade tensions in their...

Microsoft is launching IoT Central today, a new Internet of Things (IoT) service that gives enterprises a fully managed solution for setting up their IoT deployments without needing the in-house expertise necessary for deploying a cloud-based IoT solution from scratch. It’s basically IoT-as-a-Service. In addition, the...

When it comes to keeping confidential data locked down, it turns out that even employees trained in cybersecurity best practices still don't always know how to protect sensitive information, according to the Dell End-User Security Survey 2017 released today. While employees don't want their companies to...

The rapid advancement of mobility in the enterprise has often outpaced the development of mobile data security best practices, and this obstacle is made more complicated by the fact that mobile devices now include emerging technology such as the internet of things. The trend has...