Join us for a live webinar on 5/17 : Make your data safe from hackers, boost recovery preparedness across hybrid and multi-cloud environments, and keep your business running.
Beating up on the tech industry is the rare bipartisan issue in a hyper-partisan age, and it is an open question of who will become the face of the tech crackdown.
Google and its industry allies are making a late bid to water down the first major data-privacy law in the U.S., seeking to carve out exemptions for digital advertising, according to documents obtained by Bloomberg and people familiar with the...
The growth of AI-based fake videos have security managers looking at how they might impact their organization -- deepfakes have the very real ability to be used in criminal activity against businesses.
Amazon.com Inc. will let Alexa users opt out of human review of their voice recordings, a move that follows criticism that the program violated customers’ privacy.
Regulators and lawmakers in the U.S. and Europe are examining whether Google, Apple Inc. and Amazon.com Inc. are violating privacy by employing human reviewers to listen to voice commands recorded by digital assistants.
Time may be running out for Facebook Inc. and other technology companies to come to a voluntary agreement providing law enforcement officials with access to the encrypted communications of their users.
"Since May 2018, we have more and more cases of investigations that are just dropped or severely delayed because we can’t have direct access to WHOIS registration data information,” said Gregory Mounier, head of outreach and internet governance at...
A hack of health-care data involving a medical bill collector and two major diagnostics companies has grown to almost 20 million people, and is now attracting more questions from key members of Congress.
The internet giant will try to convince the world it’s a responsible steward of all that information. To make that case, Google will first have to fix Android, a mobile operating system that’s wildly popular but hobbled by security flaws.