Several sources are reporting new POS malware hitting retail businesses, and a Dell study reveals lack of upgrades and maintenance to be one problem behind the attacks. More >
IBM is trying to create a community through which IT security professionals can collaborate to better identify threats and share alerts. More >
Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense. More >
As Rob Enderle has discovered, even police departments aren't safe from the latest ransomware and scams. More >
The Verizon report should be met with a certain amount of skepticism because painting a bright picture serves the carrier that makes its money based on its network being used. More >
With limited IT resources and massive amounts of customer data to protect across multiple endpoints, effectively monitoring and defending the network from vulnerabilities is no easy task. More >
Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.More >
New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.More >
Don't ignore these potentially serious vulnerabilities.More >
Many CIOs are enthused by the potential of the Internet of Things, Big Data and cloud computing, but are uncertain as to whether they are prepared to maintain an IT workforce with all the necessary skills to support it.
The code review, or in developer parlance, the pull request, is the number one way to set the tone, rhythm and bar needed to build a high-performing team.
While we have much to accomplish in our quest for the mobile enterprise, many lessons have already been learned; lessons we can apply moving forward.More >
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...
This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...