Small business evangelist Ramon Ray and Norton encourage SMBs to improve their cybersecurity efforts for 2015. More >
News this week included 100G Metro, IoT security, the Obama administration on data usage, Apple vs. Samsung and Microsoft's HoloLens innovations. More >
Seven critical considerations for IT professionals who are looking to optimize their operations in 2015 to ensure a secure and efficient enterprise. More >
It's not just the bad passwords, it's the reuse of the same passwords that makes networks vulnerable. More >
With IBM's new encryption technology, users will have a set of encrypted credentials that are verified by Identity Mixer without needing to provide address or credit card info. More >
National Data Privacy Day is meant to encourage better privacy and security practices when using our multitudes of devices. More >
New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.More >
Don't ignore these potentially serious vulnerabilities.More >
Cloud means that an enterprise must trust a service provider to provide controls at a physical and infrastructure layer, but logical controls can remain the same.More >
Given the rising cloud adoption, the increased interest in data visualization tools and the rise of internal enterprise app stores, 2015 is expected to be a big year for the cloud.More >
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...
This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...
In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization mus...