OTA analyzed approximately 1,000 websites in three categories: consumer protection, privacy and security. More >
While funding and awareness have increased, it is unclear if organizations are making investments that keep up with the evolving security landscape. More >
Already, criminals have developed a spear phishing attack that bypasses two-factor authentication methods on mobile devices to gain access to email accounts. More >
The increasing use of the Internet for health care guarantees that crackers will sharpen their attacks as time goes on. More >
Every industry is failing miserably at cybersecurity, but no industry is as bad at cybersecurity as our government. More >
MSSPs are at an exciting point where market acceptance, awareness and demand have converged. However, excitement and the prospect of profits can create haste, and with haste comes an increased risk of mistakes. More >
A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.More >
A Symantec exec breaks down the three main categories of cybersecurity threats.More >
Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.More >
It is essential that your entire team - developers, testers, and the business - have a highly accurate, near real-time measure of the risk and quality associated with the features in your delivery pipeline.
VMware CEO Pat Gelsinger says this brave new world of enterprise IT will require not only fundamental changes to the way enterprise applications are built and delivered, but also the way IT infrastructure is provisioned and managed.
Got a gadget-loving grad or dad that you need a gift for? We've gathered a list of 11 new and innovative gadgets that are sure to please.
While funding and awareness have increased, it is unclear if organizations are making investments that keep up with the evolving security landscape.More >
This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...