A mobile payment problem that occurred during the Super Bowl demonstrated significant usage. More >
One report said that by this year, nearly all of cloud security incidents will be the fault of the customer, not the service provider. More >
The biggest concern of DDoS attacks isn’t the frequency with which they are happening but how powerful they’ve become. More >
If you put aside safety, it is easy to argue that a user-focused company should let users run whatever version of the OS they want to run. But we have to consider security now. More >
AI may not solve every IT security issue. But it can go a long way to helping IT organizations address IT security issues at scale. More >
Enigma Software, maker of the SpyHunter anti-malware tool, talks about patterns in our computing behavior. More >
The health care sector is an especially attractive target for cyberattacks, and especially vulnerable due to its weakest link: the supply chain.More >
Wolfram Jost, chief technology officer at the German enterprise software giant, Software AG, shares candid thoughts on security, software and the coming age of platforms.More >
As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.More >
With all the new products being introduced to company networks, the opportunity for vulnerabilities and security and compliance complications continues to escalate for IT teams.
If you put aside safety, it is easy to argue that a user-focused company should let users run whatever version of the OS they want to run. But we have to consider security now.
No matter how much you nag people, plead with them and warn them, these mistakes and risky behaviors never seem to end.
The digital transformation process is sparking significant changes in the way organizations hire, work and measure success, especially in IT.More >
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist...
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...
This publication assists organizations in understanding the basics of SSH interactive and automated access management in a...
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...