News this week included the state of mobile apps, Comcast's acquisition, the LightSquared saga, biometric security and broadband speeds. More >
When we see the increase in breaches and vulnerabilities and the growing concern of Internet espionage, I don’t see how anyone in a leadership role can ignore cybersecurity. More >
We may never see a completed national data protection and breach notification law, if questions about language, coverage and interference with state protections aren't adequately answered. More >
The primary issue that NopSec CEO Lisa Xu says the company is trying to address is that most IT organizations are overwhelmed by the number of vulnerabilities that need to be continually remediated. More >
Corporations have the chance to increase the security of the apps they are developing and to show that they respect the data of their customers, clients and employees. More >
News this week included a cross-country, driverless car trip, Skype alternatives, T-Mobile's new business offering, encrypted voice communication and faster 3D printing. More >
New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.More >
Don't ignore these potentially serious vulnerabilities.More >
Cloud means that an enterprise must trust a service provider to provide controls at a physical and infrastructure layer, but logical controls can remain the same.More >
You have six seconds to make a great first impression. Go! Recruiters don't give much time to resumes, so it's essential that yours is on the mark.
The three vendors are targeting the correct customer group for the first ISV-certified virtual workstation appliance solution.
With to-do lists that grow longer every hour, it's essential that we work smarter and more efficiently to keep up with the demands of everyday life.
Once again, Glassdoor has combed through tens of thousands of interview questions shared by job candidates over the past year to find some pretty spectacular oddballs.More >
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...
This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...