You have only until Sept. 9 to object to the federal governments proposed decertification of the Data Encryption Standard. After reading the proposal, Im...
RedCannon Securitys Fireball KeyPoint appliance provides a secure computing environment, enabling remote workers to access and transport files, browse Web sites, or check e-mail...
The Consumer Electronics Association, the American Library Association, Public Knowledge and DigitalConsumer.org, along with other technology and consumer groups last week responded to a...
Banks in Japan are using a biometric security system based on vein pattern-recognition technology. The system from Fujitsu Ltd. works by shining a near-infrared...
Nullsoft has released a patch for its WinAmp media player that closes a vulnerability allowing hackers to install Trojans and spyware.The company released WinAmp...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...