Print Issue: December 21, 2015
These tools address the rash of large-scale attacks and can fend off those to come, says Peter Stephenson, technology editor.
What’s to come in the cyber universe in 2016 and beyond? What threats will be most challenging for security pros? We compiled predictions from a number of experts.
To get to the Hall of Fame an Innovator must have been on our radar for some time and in the year-end Innovators issue for three years.
Is it possible for legislative developments to keep up with the rate of innovation among hackers? Jeremy Seth Davis investigates.
Our selection in this category is living proof that one doesn’t need a big organization to turn out a first-rate product with a lot of innovation behind it.
Privacy is not a new concept but it’s one that gathered steam in 2015 as it faced threats and found renewed support. Teri Robinson reports.
Collecting data needs to be diverse allowing data collection directly off of network devices and from questionnaires and other “soft” sources.
A number of criminal cyber operations were taken down this year owing to international cooperation between law enforcement agents. Ashley Carman reports.
The evaporation of the perimeter has made the idea of an infrastructure a bit fuzzy and, certainly, the notion of a surety infrastructure is an equally gray area.
Encryption will impact everyone from security personnel to consumers in the post-quantum computing world, reports Doug Olenick.
Next post in Features