Security

Articles

Is It Time for Federal and State Leaders to Improve Cybersecurity Efforts?

When we see the increase in breaches and vulnerabilities and the growing concern of Internet espionage, I don’t see how anyone in a leadership role can ignore cybersecurity. More >

Why the Data Security and Breach Notification Act Is Drawing Ire

We may never see a completed national data protection and breach notification law, if questions about language, coverage and interference with state protections aren't adequately answered. More >

NopSec Updates Unified Vulnerability Management Service

The primary issue that NopSec CEO Lisa Xu says the company is trying to address is that most IT organizations are overwhelmed by the number of vulnerabilities that need to be continually remediated. More >

Mobile App Development Often Ignores Security Measures

Corporations have the chance to increase the security of the apps they are developing and to show that they respect the data of their customers, clients and employees. More >

Drive from California to New York, Leave the Driver Home

News this week included a cross-country, driverless car trip, Skype alternatives, T-Mobile's new business offering, encrypted voice communication and faster 3D printing. More >

Seven Ways to Improve Cybersecurity Through Behavioral Analysis

No matter how advanced SIEM tools become, security pros must back up their findings with data rooted in the company's daily IT activities in order to glean valuable insights. More >

More Articles >

Interviews

IAPP’s New Privacy Certification Addresses Emerging Landscape

New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.

More >

Making VDI More Secure

Don't ignore these potentially serious vulnerabilities.

More >

Data at Home and in the Cloud

Cloud means that an enterprise must trust a service provider to provide controls at a physical and infrastructure layer, but logical controls can remain the same.

More >

More Interviews >

Most Popular Features

Resume Cleanup: Sixteen Items You Should Remove Today

You have six seconds to make a great first impression. Go! Recruiters don't give much time to resumes, so it's essential that yours is on the mark.

Dell, VMware, NVIDIA Use Tesla Model to Change Personal Computing Forever

The three vendors are targeting the correct customer group for the first ISV-certified virtual workstation appliance solution.

Fourteen Android Apps to Help You Get the Job Done

With to-do lists that grow longer every hour, it's essential that we work smarter and more efficiently to keep up with the demands of everyday life.

Editor's Choice

Top 30 Oddball Interview Questions in the U.S., UK and Canada for 2015

Security Staffing

Once again, Glassdoor has combed through tens of thousands of interview questions shared by job candidates over the past year to find some pretty spectacular oddballs.

 More >

Puppet Labs Extends IT Automation Reach

Bringing Order to the Cloud

G.fast Coming Faster and Faster

Think Data Ethics Don’t Matter? You’re Wrong

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...

Misc43 Guidelines for Smart Grid Cybersecurity

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date