News this week included autonomous vehicle vulnerabilities, a Google Fiber delay, low demand for high-speed Internet in Tennessee, updating penetration testing strategies, and combining augmented and virtual realities. More >
Contrary to popular opinion, there are new reports about overall security issues with iPhones and iOSs. More >
Whether IPv6 is dangerous or not depends more on the people running it than the addressing scheme itself. More >
Motivations behind the attacks ranged by industry and, predictably, not a single sector was left untouched by the unscrupulous actors. More >
In the wrong hands, privileged accounts represent the biggest threat to enterprises. More >
Security and IoT issues take the stage at the 2016 BlackBerry Security Summit. More >
We have built a regulatory framework that is ineffective at recognizing, let alone combatting, cybercrime.More >
CEO talks about the work SAP NS2 is doing, especially in regard to serving U.S. military veterans.More >
Guidance Software CEO discusses the relationship of private versus public sectors, particularly when it comes to the jurisdiction of security events.More >
To get an accurate read on the value of software engineer salaries across the country, Glassdoor has identified the top 25 cities by calculating the 'real adjusted salary' for each city.
Users are spending more time per day playing Pokemon GO than they are using popular social media sites like Facebook and Twitter.
The router of tomorrow needs to operate differently and more intelligently to handle network demands such as IoT and increased video traffic driven by collaboration, monitoring and virtual reality.
Enterprise app stores allow organizations to have tighter control over their own app marketplaces. Check out current trends influencing the enterprise app store sector.More >
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist...
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...
This publication assists organizations in understanding the basics of SSH interactive and automated access management in a...