Regardless of the size of an enterprise or its industry, organizations must create and implement an incident response program to effectively and confidently respond to current and emerging cyber threats.More >
Global research shows 37 percent of technology budgets now controlled outside of IT departments; 79 percent of C-level executives believe they can make better and faster decisions without the involvement of IT.More >
One of the most dangerous IT security threats of all time emerged recently -- a bug called Heartbleed. Here are eight tips for keeping your data safe.More >
VCE is proving that focusing on customers' unique needs can be the path to.... More >
If you are planning a BI investment in the near future, here are six common mistakes that you need to avoid to ensure your investment is an effective.... More >
The use of social engineering to distribute malware continues to account for the bulk of cyber attacks against consumers and enterprises, thereby.... More >
The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including security and privacy impacts and secure communication via telephone, email, mobile and smartphones, instant messaging and traditional mail.
Responsibilities include participating in information technology risk assessments, IT audits, Sarbanes-Oxley compliance assessments, and IT consulting engagements.
This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications.