Security

Articles

Is Your Website Failing to Keep Customers’ Data Secure and Private?

OTA analyzed approximately 1,000 websites in three categories: consumer protection, privacy and security. More >

Don't Let the IT Security Paradigm Shift Leave You Stranded

While funding and awareness have increased, it is unclear if organizations are making investments that keep up with the evolving security landscape. More >

Two-Factor Authentication: Better Than Passwords But Still Not Foolproof

Already, criminals have developed a spear phishing attack that bypasses two-factor authentication methods on mobile devices to gain access to email accounts. More >

Cybersecurity Especially Tough in Health Care

The increasing use of the Internet for health care guarantees that crackers will sharpen their attacks as time goes on. More >

Government Fails Miserably at Cybersecurity

Every industry is failing miserably at cybersecurity, but no industry is as bad at cybersecurity as our government. More >

Five Mistakes Managed Security Service Providers Should Avoid

MSSPs are at an exciting point where market acceptance, awareness and demand have converged. However, excitement and the prospect of profits can create haste, and with haste comes an increased risk of mistakes. More >

More Articles >

Interviews

MacKeeper Has More Work to Do to Clean Up Its Act

A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.

More >

A Conversation About Symantec’s 2015 Internet Security Threat Report

A Symantec exec breaks down the three main categories of cybersecurity threats.

More >

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.

More >

More Interviews >

Most Popular Features

Eight Hot DevOps Software Testing Tools

It is essential that your entire team - developers, testers, and the business - have a highly accurate, near real-time measure of the risk and quality associated with the features in your delivery pipeline.

VMware CEO: A Brave New World of Enterprise IT

VMware CEO Pat Gelsinger says this brave new world of enterprise IT will require not only fundamental changes to the way enterprise applications are built and delivered, but also the way IT infrastructure is provisioned and managed.

Eleven Hot Gadgets for Dads and Grads

Got a gadget-loving grad or dad that you need a gift for? We've gathered a list of 11 new and innovative gadgets that are sure to please.

Related IT Downloads

Misc29 Interfaces for Personal Identity Verification

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date