The Insider Threat is the most dangerous way to gain inside access to sensitive information.
To extend the "right to be forgotten" ruling, Google will start removing certain search results across all domains in the European Union.
To quickly detect an occurring cyber-attack on endpoints, there are seven important security controls required to be put in place by a wide variety of security regulations.
Fundamental concerns remain over what is described as a lack of clarity in the Draft Investigatory Powers Bill, with calls from industry bodies for earlier recommendations to be implemented.
Gmail's security is being enhanced to keep its users protected from malware, phishing attacks and other threats.
UK-based Barclays PLC has teamed up with Interpol to more efficiently fight cyber-crime
In addition to debuting Apple Music on Android, Apple could soon move more of its mobile applications to its competitor.
Toy merchant VTech is placing blame for its insecurity issues on its own users.
The hacker responsible for breaching the Department of Justice's web portal has publicly posted stolen data corresponding to roughly 20,000 employees of the FBI and 9,000 from the Department of Homeland Security.