DDoS Attacks Surging

The biggest concern of DDoS attacks isn’t the frequency with which they are happening but how powerful they’ve become. More >

Windows 10 Forced Upgrade: Fighting Decades-Long Institutional Insanity

If you put aside safety, it is easy to argue that a user-focused company should let users run whatever version of the OS they want to run. But we have to consider security now. More >

PatternEx Applies Artificial Intelligence to IT Security

AI may not solve every IT security issue. But it can go a long way to helping IT organizations address IT security issues at scale. More >

What Anti-Malware Scanning Stats Can Tell Us About Our Lifestyles

Enigma Software, maker of the SpyHunter anti-malware tool, talks about patterns in our computing behavior. More >

Unified Communications, Same as It Ever Was

Unified communications (UC) continues to be IT’s version of the high school student who yearns to sit at the cool kids’ table but never quite makes it. More >

2016 Cloud Security Trends: Confidence on the Rise

Cloud security is no longer seen as such a vulnerability and businesses in every sector are now confidently adopting the technology despite the sensitive nature of the information they hold. More >

More Articles >


Supply Chain Weakens Health Care Sector’s Cyberattack Defenses

The health care sector is an especially attractive target for cyberattacks, and especially vulnerable due to its weakest link: the supply chain.

More >

Dwelling on Security Concerns Can Stifle Innovation, CTO Says

Wolfram Jost, chief technology officer at the German enterprise software giant, Software AG, shares candid thoughts on security, software and the coming age of platforms.

More >

Collaboration Between HR, IT Essential to Prevent Data Breaches, HR Exec Says

As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.

More >

More Interviews >

Most Popular Features

10 Best Tech Jobs in the U.S. in 2016

With a shortage in qualified applicants for in-demand tech positions, IT pros have the luxury of being selective about the jobs they choose. So which are the best tech jobs for 2016?

The New BlackBerry: Kicking It Up Several Notches on Security and MDM

As part of its fight to return to relevance, BlackBerry has embraced other platforms this week.

Top 25 Cybersecurity Companies to Watch in 2016

Cybersecurity Ventures recently announced their Q1 2016 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.

Related IT Downloads

Checkbox1 National Checklist Program for IT Products – Guidelines for Checklist Users and Developers

This document makes recommendations for how users and developers should select checklists from the NIST National Checklist...

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...

Security29 Security of Interactive and Automated Access Management Using Secure Shell (SSH)

This publication assists organizations in understanding the basics of SSH interactive and automated access management in a...

Security35-290x195.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.