Security experts say a new scam is spreading fast, and it looks like something many people get all the time: A simple ...
Quantum computing promises extraordinary power, but that same power may expose new security weaknesses. Quantum computers are expected to deliver dramatic gains in processing speed and capability, ...
The safe and secure use of nuclear and other radioactive material, along with the operation of nuclear facilities and management of associated facilities and activities, rely heavily on information ...
Interested contributors now have until 15 October 2025 to submit abstracts for the IAEA’s International Conference on Computer Security in the Nuclear World: Securing the Future, or CyberCon26.
You have a responsibility to your customers and your business to keep all sensitive data secure. Here are 17 best practices ...
US lawmakers have extended the Cybersecurity Information Sharing Act of 2015 for another nine months, buying time to enact a replacement for the legislation.
Security professional association ISACA is to offer its member base of almost 200,000 accredited security professionals around the world access to a new certification, Advanced in AI Security ...
Randomness is a source of power. From the coin toss that decides which team gets the ball to the random keys that secure online interactions, randomness lets us make choices that are fair and ...
Google was once again forced to announce that it had not suffered a data breach after numerous news outlets published sensational stories about a fake breach that purportedly exposed 183 million ...
Following a national search, the Georgia Institute of Technology has selected Joseph “Joe” Lewis as its new associate vice president of Information Technology and chief information security officer.