Security

Articles

Financial Sector Sees Cyber Incident Increase in February

In February 2015, Financials was the lone industry sector with cybercrime incidents above six-month averages. This is largely attributed to the massive breach at health insurer Anthem. More >

Hotel Wi-Fi Vulnerability a Reminder About Security Risks on the Road

No one should assume that the Wi-Fi they are using is secure, including (perhaps especially) in hotels. More >

Decision on Comcast’s Time Warner Cable Acquisition Not Likely Until Summer

News this week included the state of mobile apps, Comcast's acquisition, the LightSquared saga, biometric security and broadband speeds. More >

Is It Time for Federal and State Leaders to Improve Cybersecurity Efforts?

When we see the increase in breaches and vulnerabilities and the growing concern of Internet espionage, I don’t see how anyone in a leadership role can ignore cybersecurity. More >

Why the Data Security and Breach Notification Act Is Drawing Ire

We may never see a completed national data protection and breach notification law, if questions about language, coverage and interference with state protections aren't adequately answered. More >

NopSec Updates Unified Vulnerability Management Service

The primary issue that NopSec CEO Lisa Xu says the company is trying to address is that most IT organizations are overwhelmed by the number of vulnerabilities that need to be continually remediated. More >

More Articles >

Interviews

IAPP’s New Privacy Certification Addresses Emerging Landscape

New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.

More >

Making VDI More Secure

Don't ignore these potentially serious vulnerabilities.

More >

Data at Home and in the Cloud

Cloud means that an enterprise must trust a service provider to provide controls at a physical and infrastructure layer, but logical controls can remain the same.

More >

More Interviews >

Most Popular Features

Developing Tech: What's Next?

Consumers will start to require more utility from tech, and the enterprises behind the scenes will be forced to rise to those expectations.

Chip Wars: Looking at the Strategies of AMD, IBM, Intel and Qualcomm

Four big players are taking four very different paths to success.

Fourteen Android Apps to Help You Get the Job Done

With to-do lists that grow longer every hour, it's essential that we work smarter and more efficiently to keep up with the demands of everyday life.

Editor's Choice

Five Ways Smartwatches Will Change E-Commerce

Security Staffing

Smartwatches will change e-commerce as we know it, whether it's through altering the face of consumer data, miniaturizing the act of consumer engagement, or changing the way we pay for things.

 More >

CIO or CTO: Which One Will Survive the Cloud and Keep a Seat at the Table?

What to Consider Before Taking Your SMB Global

IT Career News: Odd Questions, CIO vs. CTO, Money Talks

How the iPaaS Market Became a Volatile Boom Town

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...

Misc43 Guidelines for Smart Grid Cybersecurity

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date