Security

Articles

Acronis Employs Heuristics and Blockchain Technologies to Combat Ransomware

Acronis is making it simpler to defeat these attacks by detecting ransomware attacks in real time to enable end users to recover data being affected from an image backup. More >

IoT’s Growing Pains Put Devices at Risk for Ransomware

The IoT is so at risk for ransomware because of three particular areas: the growth (and growing pains) of IoT, the evolution of ransomware, and end users who aren’t aware of the risks. More >

Gmail Phishing Attack Highlights Need for Multi-Factor Authentication

We should expect more phishing attacks like this, or at least increasingly sophisticated and more difficult to detect. More >

9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. More >

Digital Transformation Has Companies Re-thinking Security Strategies

In the age of digital transformation, improving the “security playbook” is necessary in order to avoid the C-suite level executive’s two worst nightmares: corporate financial data theft and customer information theft. More >

Consultant: Convince Higher Ups to Protect Critical Infrastructure Control Systems

News this week included ICS/SCADA security, Giuliani and security, and changes at Alphabet around connectivity projects. More >

More Articles >

Interviews

‘Security Operations Center’ Approach Is Fail-Safe Against Cyberattacks, CEO Says

A key line of defense will take the form of “security operations centers,” or SOCs. And with SMBs expected to be targeted more aggressively by the bad guys, making the SOC approach affordable is going to be essential.

More >

‘Real’ CRM Could Have Prevented Wells Fargo Fraud, CEO Says

The recent scandal at Wells Fargo could have been prevented if the right CRM system had been in place.

More >

4 Tips to Help Protect Proprietary Information When Employees Leave

The ease with which confidential information can be shared outside the company is a perennial headache for those charged with managing security.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Editor's Choice

Concerns Surrounding Identity Security

In all the predictions for 2017, few discuss identity and access issues, but as the line between professional and personal life continues to blur, IAM has to be a higher priority in the coming months.

 More >

IoT Security: Big Trouble in Small Packages

Algorithms Pale to Holistic, Human-Centric Recruiting Approach, Tech CEO Says

CA Technologies Sets Sights on Business Process Automation

Progress Being Made on NFV Interoperability

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...

Security95-290x195.jpg Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships....

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.