Google is making progress in its Android security efforts and significant dangers exist. The two facts are not contradictory. Hopefully, the balance will continue to tilt toward progress and away from insecurity. More >
Before the enterprise becomes too dependent on blockchain, it would be wise to make sure it can provide a trusted ledger of digital events both now and into the future. More >
The Secret Service theft is a reminder of how common the disappearance of our devices can be and the risks that are involved. More >
Innovative use of Blockchain could do some fascinating things to how we do transactions. Even things like paying taxes or voting could be dramatically changed, because at the heart of this is a validated identity. More >
Twitter has serious flaws that have led to hacked accounts that were then taken over by bad actors. More >
NodeSource announced NodeSource Certified Modules, a registry through which it certifies that various Node.js modules are stable and secure. More >
Stan Black, chief security officer at Citrix Systems, says companies need to be focused on data analytics, machine learning, and an understanding of individuals’ roles.More >
A key line of defense will take the form of “security operations centers,” or SOCs. And with SMBs expected to be targeted more aggressively by the bad guys, making the SOC approach affordable is going to be essential.More >
The recent scandal at Wells Fargo could have been prevented if the right CRM system had been in place.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
A large majority of security operations centers, or SOCs, have not attained the requisite level of maturity to enable them to adequately protect their organizations against cyberattacks.More >
This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...
This publication provides guidelines for establishing and participating in cyber threat information sharing relationships....
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...