Cloud security is no longer seen as such a vulnerability and businesses in every sector are now confidently adopting the technology despite the sensitive nature of the information they hold.More >
No matter how much you nag people, plead with them and warn them, these mistakes and risky behaviors never seem to end.More >
Even small changes can have a big impact on the success of managing IT tickets. Here are 10 steps organizations can use to keep their help desk from spinning out of control.More >
With a shortage in qualified applicants for in-demand tech positions, IT pros have the luxury of being selective about the jobs they choose. So which.... More >
As part of its fight to return to relevance, BlackBerry has embraced other platforms this.... More >
Cybersecurity Ventures recently announced their Q1 2016 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies.... More >
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products.
In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing and how technology is enabling this transition.
The excerpt focuses on the importance of stakeholder engagement in the agile project, an essential practice that ensures a successful product delivery.
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle.
This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.