Education and Careers
Future of Business and Tech
Education and Careers
Online and Mobile Safety
3 Ways to Combat Fear and Doubt Surrounding Ransomware
Ransomware is a specific strain of computer virus that’s been in the news. Learn how to protect yourself.
Facing Cyber Security Threats As a United Nation
When it comes to the Internet of Things (IoT), security can’t be viewed as the icing on the cake.
Here’s How Identity Theft Actually Works
Identity theft has become easier than ever for criminals, while the victims pay a huge cost financially and emotionally.
3 Keys to Uncovering Cybersecurity's Serious Password Problem
Respected security consultant Frank Abagnale, Jr. offers three compelling reasons why everyone should pay more attention to their log-in habits, and why we should consider graduating from passwords all together.
Retail’s Quiet Internet of Things Revolution
In a world of fast-developing technology, retail companies that place a premium on security could go the furthest.
How Can You Play a Role in Increasing Our Country’s Cyber Security?
As bad actors get more technologically savvy, we all need to do our part to keep ourselves and our country safe in cyber space.
Frank Abagnale: How Safe Is Your Password?
In an exclusive op-ed, security consultant Frank Abagnale Jr. gives three good reasons why everyone should eliminate the bad, outdated use of usernames and passwords
NAFA’S Cybersecurity Recommendations for New Vehicles
In response to new and changing technology in vehicles, NAFA seeks to establish rules and guidelines to protect the privacy and security of owners.
How to Improve Your Mobile Data’s Security
While mobile devices continue to entwine themselves in our personal and business lives, the fact remains that their ubiquity and ease-of-use have become a liability.
Encryption Does More Than Protect Your Digital Services
Encryption is commonly understood as necessary protection to our digital life. Yet that is only one feature of this Swiss army knife we rely on — whether we know it or not.
How to Work Around the Inherent Flaw of Cybersecurity
Cybersecurity remains on the center stage, as cyberattackers continuously outpace business efforts to stop them and law enforcement efforts to catch them.
Taking a Stand Against Sophisticated Malware
Malicious software can wreak havoc on your finances and your life. To stay ahead, here are the most common threats—and the best ways to protect your prized data.
Avoiding Data Breaches, Identity Theft and Other Online Risks
The recent legal battle waged by the FBI and Apple over protecting the security of iPhones has increased awareness about the information we store on our devices.
Keeping Game Content Safe for Your Kids
As games become more easily accessible online and on mobile devices, how do we make sure our kids are having age-appropriate fun?
Finding Weak Points Helps Your Company Better Protect Its Data
Technological advances are transforming how people and machines interact. They are also increasing the volatility of today’s security landscape.
8 Rules for Avoiding Spam and Spyware
As a society, we have never been more connected—to the internet. Practically everything we do and every place we go has an online component.
Establishing an Expert Defense for Your Company’s Cloud
Cloud security is a topic that many people agree is important, but few know how to implement when time comes to protect their own data.
5 Steps to Closing the Cybersecurity Skills Gap
The threat landscape is changing daily and threats are becoming more complicated. Unfortunately, the number of qualified cybersecurity professionals is not keeping up.
5 Ways to Protect Your Business from Cyberattacks
From the world’s largest airports to your local bagel shop, no one is safe from today’s smartest cyberattackers.
4 Steps to Fully-Realized Cloud Security
Storing sensitive data on the cloud can be beneficial yet risky. Follow these steps to make the system work for you or your business.
What You Need to Know About Mobile Data Theft
Sixty-one percent of consumers don't know how to secure their connected devices, and hackers are aware of this vulnerability.
4 Essentials for Keeping Your Personal Data Private
Digital data supports contemporary life and our economy; protecting it is crucial, and there are four fundamental steps to doing so.
Experts Explain the Best Way to Protect Your Data
In an increasingly digital world, trust will matter most when it comes to the services consumers and corporations decide to use. Encryption is the foundation of that trust.
Robert Herjavec’s Advice for Navigating Cyberattacks
Noted entrepreneur and “Shark Tank” investor Robert Herjavec opens up about how we’ve defined cybersecurity, where we’ve left to improve and how the casual digital denizen can stay protected.
Guy Kawasaki’s 5 Social Media Essentials
The former Chief Evangelist for Apple and renowned Silicon Valley stalwart shares his short-list of tips for reaching customers and staying relevant in the social media economy.
4 Tips for Keeping Hackers Out of Your Holiday Plans
It should come as no surprise that criminals are targeting high-traffic shopping periods to steal cardholder data. But online criminals aren’t waiting around for the holidays to start stealing your precious data.
Weak Systems, Strong Attackers: Cyber Security in the Modern Age
There are only two kinds of companies: those who know they have been successfully compromised, and those that don’t know they have been successfully compromised.
The IoT at Home: Smart Houses, Happy Homeowners
The Internet of Things is about connectedness among all of the things that surround us, including our car, our coffee maker, our sprinkler system and the cloud where we can find just about anything that we can imagine.
Why Should You Care About the Cloud?
For the past few years the industry has been promising that cloud computing would drive innovation and make our devices safer. But has the cloud fulfilled its promise?
Why 2015 Is the Year of the Public Cloud
Pity your private cloud, if you have one. If cloud analysts are to be believed, the private cloud is losing ground as public cloud providers keep adding features and functions, many of which target enterprise IT buyers.
Cloud Solutions For Real-Time Defense
Millennials will benefit greatly from knowing the cloud and its benefits in regards to digital security.
Why MDM? Enterprise Mobility: Death By A Thousand Cuts
Managing mobile devices to secure business information.
You Are the Greatest Weapon Against Cyber Crime
The technological innovations leveraged by businesses continuously reveal new cyber threats that can be combatted through training, education, and awareness.
Anatomy of a Cyber Crime
Over just the last ten years, the range and scope of cyber crime has become even broader than the range of physical crime.
A Personal Guide to Staying Safe Online
Cybercriminals can steal your sensitive personal information by taking control of your computer, thankfully there are methods to prevent this.
Mobile Security: Changing the Very Nature of Cyber Risk
The most impactful new cyber threat comes from smart phones and tablets, which use the airwaves as their communication media.
Innovations in Transactions: Is Plastic a Thing of the Past?
What consumers and merchants can expect for the future of transactions.
Raising the Next Generation of Digital Citizens
Tips from online safety expert Hemu Nigam, CEO, SSP Blue
Connecting Safely: 7 Tips to Protect Your Mobile Device
The 21st century’s dizzying array of new technologies provide users with powerful networking tools and hours of entertainment, but they also introduce a whole new world of risks.
Parents, Wake Up: The Hidden Dangers of the Internet
Are you aware of the dangers your children are exposed to while surfing online?
Free Ways to Stay Safe on Your Cell Phone
There are plenty of small steps you can take to ensure your mobile security without spending a dime.
Digital Devices: How Young is Too Young?
Children these days are growing up surrounded by new technologies. The question isn’t if parents should allow their kids to use online devices, but when?
5 Tips for Ensuring Your Loyalty Program Assets Are Passed Down
It’s human nature: the more people invest in something, the stronger their feelings of ownership. Make sure no one takes your rewards points away from you.
How the Consumerization of IT Affects U.S. Government Procurement
The consumerization of IT phenomenon has turned the traditional centralized IT model on its head. This is especially true with regard to the United States Government.
What Is the Next Phase of Cybercrime?
The future of cybercrime is not big breaches or ransomware, it’s the Internet of Things and the billions of connected devices that come with it.
Robert Herjavec Discusses How Cybersecurity Can Help Your Business Grow
In the age of the internet, a company’s commitment to protecting their customer’s information and improving cybersecurity is crucially important to building customer loyalty.
Frank Abagnale Jr. Reveals 3 Reasons Passwords Are Not Your Friend
Famous con man-turned-security consultant Frank Abagnale explains why data security norms are outdated and insufficient.
Smart Home Technology Expands Your Security Options
By integrating smart home technology, residential security systems can be made more responsive and adaptive in the case of an emergency.
How to Turn Your House into a Smart Home
Bill Lee, Vice President of Smart Home Product Marketing at Samsung Electronics America, sat down with Mediaplanet to talk about how smart home technology is simpler than you realize.
6 Simple Ways to Protect Your Personal Data
From salacious selfies to social security numbers, hackers do not discriminate. Here are six ways you can protect yourself.
4 Things We Learned from the World’s Most Famous Hacker
Today, hackers have infiltrated the mainstream media, but what do you really know about the role these unexpected, unsung heroes play in protecting your privacy?
Leading Tech Companies Weigh in On the Future of Digital Security
Security experts share their thoughts on the impacts of IoT growth for both businesses and individuals.
Internet of Things Needs Greater Commitment to Security
IoT’s ability to connect cyber with physical makes it less of a technology and more of a transformation that will force security improvements.
Big data, bigger ideas.
We’ll send more stories, interviews, and videos straight to your inbox.
Future of Business and Tech
Education and Careers