In addition to being an enterprise resource planning (ERP) tool, SAP is also a primary storage vault for a vast amount of sensitive and business-critical data. More >
When Sue Poremba's personal information was compromised in a cyberattack on Penn State's networks, she was left with a lot of questions and few answers. More >
Overall, the study found that compliance is taking on a more significant role across organizations – moving beyond traditional archiving and e-discovery efforts, to add value to sales and marketing, HR, risk assessment and cybersecurity. More >
The IRS revealed this week that hackers used its transcript service to breach the data on 100,000 U.S. taxpayers. More >
Cybersecurity threats are growing. To defend against increasing threats, agencies must comply with various cybersecurity mandates that often fail to take the user experience into account. More >
Edge Drive means that IT organizations can better serve the needs of their end users while continuing to provide a consistent set of data protection policies and procedures across all the endpoints. More >
A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.More >
A Symantec exec breaks down the three main categories of cybersecurity threats.More >
Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.More >
Quick, name a horrible boss you've had (or have). Unless you've yet to hold a job, it's unlikely that you had any trouble bringing a name or two (or three) to mind.
Many organizations have application development backlogs, so IBM joined Ionic to help reduce that backlog using tools that are inherently cross platform.
Enterprise software development is a massive undertaking. Yet, surveys show that more than half of businesses are flat-out terrible at getting users to adopt new software.
Overall, the study found that compliance is taking on a more significant role across organizations – moving beyond traditional archiving and e-discovery efforts, to add value to sales and marketing, HR, risk assessment and cybersecurity.More >
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...
This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...