Top Stories

The Internet of Useful Things is Smart, Connected, and Secure
Sensors Team Up to Thwart Trespasser Drones
Embedding Security at the Border Checkpoint
Discovering the “Key” to Security for Wireless

News, Analysis & Features

Featured Blogs

Recommended Technology Papers

  • Security Orchestration and Incident Response: An RSAC Session Transcript

    We can trust technology—right? If you’re renowned cybersecurity expert Bruce Schneier, the answer is “not exactly.” In this transcript from his RSA Conference 2018 session, Schneier addresses some of technology’s biggest double-edged swords and offers intel on how to boost organizational resilience.

  • Securing the Public Domain

    Forget professional athletes and celebrities; cybersecurity is today’s real headliner. From politics to your personal life, technology writer and blogger Tony Kontzer delves into cybersecurity’s growing public role and what it means for the future of data security.

  • Prioritizing Security: Cybersecurity’s Big Role in Business

    Infosec is finally getting its moment in the spotlight. Amidst cases of workplace radicalization and commercial data breaches, technology writer and blogger Tony Kontzer shares his findings on the extensive—and rapidly growing—role of infosec leadership in real-world companies, and security’s rise to the top of business agendas.

  • Secure Linux Development with SUSE Embedded Solutions

    Download free white paper

EECatalog on Facebook

Extension Media websites place cookies on your device to give you the best user experience. By using our websites, you agree to placement of these cookies and to our Privacy Policy. Please click here to accept.