Even with credit card payments being all but mandatory in retail, PCI compliances, and the focus on EMV chip adoption, companies are still failing to keep credit card data secure. More >
In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions. More >
If you want to keep your data from being compromised, you have to protect your data. That includes knowing where sensitive data is stored and knowing who has access to it. More >
Any time new malware is encountered, IT can then treat the Eastwind DNS as a system of record to identify who else in their organization might have been infected by visiting the same site. More >
With state-level threats hovering over almost every country, the level of exposure creates issues at a national level and the potential for a single connected trusted company to become the critical path for a nation-level attack. More >
People are thinking about their privacy in ways they hadn’t before and are worried about what will happen to information culled by internet providers. Here are changes that will increase privacy protection. More >
Datacastle CEO Ron Faith discusses mitigating the risk around employees walking out the door with sensitive company data.More >
Stan Black, chief security officer at Citrix Systems, says companies need to be focused on data analytics, machine learning, and an understanding of individuals’ roles.More >
A key line of defense will take the form of “security operations centers,” or SOCs. And with SMBs expected to be targeted more aggressively by the bad guys, making the SOC approach affordable is going to be essential.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
To usher in the next user interface, the AR/VR industry will have to clearly demonstrate that it can provide not only a different means of working, but a better one.More >
This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...
This publication provides guidelines for establishing and participating in cyber threat information sharing relationships....
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...