Cyber Monday Doesn’t Equal Secure Monday

Any helpfulness when it comes to improving security of the customers will go a long way in keeping those same customers happy and returning at other times of the year. More >

IBM Turns Authentication into a Cloud Service that Protects Privacy

Making Identity Mixer as a service that developers can invoke via an application programming interface (API) should considerably reduce the amount of inherent risk that organizations face when conducting transactions on the Web. More >

PoS Malware Threats Just in Time for the Busy Credit Card Season

In time for the busiest shopping and travel (and probably overall credit card use) time of the year, we are seeing a number of new Point-of-Sale (PoS) malware and PoS-related breaches. More >

Phishing 101: Beware and Prepare this Holiday Season

With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks. More >

8 Important People to Connect with During a Major IT Incident

Restoration and resolution are only the tip of the major incident communication iceberg. Really effective major incident communication reaches out to a host of other people inside and outside the organization. More >

Adding a Human Element to Cybersecurity

If friendly hackers discovered vulnerabilities, how does that information mesh with behavior analytics as a way to add another layer to security detection and prevention? More >

More Articles >


Dwelling on Security Concerns Can Stifle Innovation, CTO Says

Wolfram Jost, chief technology officer at the German enterprise software giant, Software AG, shares candid thoughts on security, software and the coming age of platforms.

More >

Collaboration Between HR, IT Essential to Prevent Data Breaches, HR Exec Says

As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.

More >

MacKeeper Has More Work to Do to Clean Up Its Act

A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.

More >

More Interviews >

Most Popular Features

Phishing 101: Beware and Prepare this Holiday Season

With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks.

Marissa Mayer and Meg Whitman Aren’t the Big Turkeys at Yahoo and HP

Fixing a CEO is easy. You either mentor them properly or replace them. But once a board goes bad, there is no easy recovery.

Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their Q4 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.

Related IT Downloads

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...

Security29 Security of Interactive and Automated Access Management Using Secure Shell (SSH)

This publication assists organizations in understanding the basics of SSH interactive and automated access management in a...

Security35-290x195.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...

Security28 Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.