Information Security
As of January 2020, new legislation will be in force for all Internet of Things (IoT) devices sold within California and Oregon  
By Victoria McIntosh in Information Security on October 21, 2020
Comparitech researchers found a massive trove of email addresses and passwords left online with no password or other authentication required to access it.
By Paul Bischoff in Information Security on December 10, 2019
Smart home security incorporates a variety of smart devices, such as cameras, sensors, and locks, all of which you can control and monitor through your smart home. Whether you own your home or rent, you can easily set up your own smart home security devices in just a few hours.
By Sam Cook in Information Security on January 19, 2023
An analysis appears to indicate online shopping scams have decreased but the monetary values involved are rising.  
By Paul Bischoff in Information Security on November 21, 2023
We analyzed the impact of data breaches on share prices. Here's what we found.
By Paul Bischoff in Blog on February 9, 2021
A data exposure of 7 million Adobe Creative Cloud account records could put users at risk of targeted phishing.
By Paul Bischoff in Information Security on January 3, 2020
Want to make sure your business is fully protected, including online? If you want to save yourself money in the event of a breach you might need cyber insurance for your business. Find out why it’s important and how to get yourself covered.
By Aimee O'Driscoll in Information Security on August 2, 2023
Many organizations argue they protect privacy through the use of aggregate, de-identified or anonymous data, but how many users understand these terms? We explain how these different techniques work and whether or not your privacy is actually protected.
By Victoria McIntosh in Information Security on September 25, 2023
Federated learning is a new approach for training the algorithms we use every day. But what actually is federated learning and is it really more private? We explain everything you should know about this new algorithm model. 
By Josh Lake in Information Security on October 25, 2019
Page 28 of 46