Security

Articles

State of IT 2015: Mid-Year Check-In

IT reality check finds IT leaders staying the course heading into second half of 2015. More >

Vendor Risk Management: Ten Frequently Asked Questions

As cyber threats become more sophisticated and complex, businesses need not only to ensure they are secure, but also that their vital partners, suppliers, and vendors are protecting themselves as well. More >

Hackers Gain Control Because Organizations Allow Them to Do So

The latest AshleyMadison breach shows how hackers have gained control over the Internet because companies are lax about cybersecurity. More >

SentinelOne Debuts AV Alternative for Endpoint Security

SentinelOne EndpointProtection Platform uses dynamic execution inspection technology to monitor behaviors based on OS activities and operations. More >

How to Minimize Fraud this Holiday Season

Learn how your organization can improve its approach to fraud prevention and lower costs involved with fraud and ID theft this coming holiday season. More >

Niara Applies Hadoop to Security Analytics

Niara announced that it is partnering with Cloudera to apply its software directly to Big Data repositories in the form of Hadoop to more quickly identify security threats. More >

More Articles >

Interviews

MacKeeper Has More Work to Do to Clean Up Its Act

A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.

More >

A Conversation About Symantec’s 2015 Internet Security Threat Report

A Symantec exec breaks down the three main categories of cybersecurity threats.

More >

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.

More >

More Interviews >

Most Popular Features

Five Common Data Encryption Myths

Data encryption seems to be the logical choice when it comes to implementing a sound security strategy, but there are still skeptics.

New Cisco IoT Certification Fills Employers, Employees Needs

The new IoT-focused CCNA Industrial certification is a lab-based training and certification, and is part of the CCNA Industrial Education curriculum.

Five Highly Valued Soft Skills for IT Pros

As IT becomes more tightly integrated into the business process, the experienced IT professional is expected to be able to understand the business, communicate ideas with coworkers and clients, negotiate, and lead.

Related IT Downloads

Security28 Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...

Misc29 Interfaces for Personal Identity Verification

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date