These types of security situations are repeating themselves, with just small individualistic quirks. More >
The key is to anticipate the problems and challenges of the replacement biometric technologies and choose the right path. More >
New research statistics show that the Android platform is receiving the bulk of attacks on mobile OSes. Is your enterprise safe from such BYOD threats? More >
The Senior Software Security Engineer is responsible for building a world-class program that embeds security into every aspect of the dev process. More >
Good Technology CEO Christy Wyatt says initially it was relatively simple to extend the application programming interfaces (API) exposed by Apple to deliver simple notifications to the Apple Watch. More >
A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.More >
A Symantec exec breaks down the three main categories of cybersecurity threats.More >
Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.More >
According to a new analysis of Dice salary data, the need for security professionals has translated into salaries for certain tech professionals that greatly exceed the baseline for tech-pro salaries.
Even though we talk a lot about collaboration and managerial skills, says Rob Enderle, we don't actually look for the correct soft skills in the C-suite often enough.
Five technology and operational trends that will help corporate IT organizations deliver better business outcomes via the optimal use of technology.
Resumes get just the briefest glance before they're 'in' or 'out' of the running. So, it's important to make a great first impression.More >
This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...