Security

Articles

Threatcasting 2026: Anticipating a Blended Cyber Attack with Up to 2M Fatalities

Efforts like threatcasting are critical to identifying potential threats and building up defenses against them and there are private companies and military organizations involved in this effort. More >

Cloudbleed Catches Security World Unaware

We don’t know how long this has been going on, how companies are reacting, or exactly what may be out there. We’ll be hearing about Cloudbleed a lot as we move through 2017. More >

7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. More >

Medical Data Theft Rising Because of Its Value

The risk is rising, but the medical industry is better recognizing the risk to patient data and is stepping up its cybersecurity efforts. More >

The Next Evolution of Ransomware Attacks

We will see shifts in ransomware, including how attackers will target victims, who they’ll target, and the role IoT will play in ransomware, both as an attack vector and attack target. More >

Addressing the Cybersecurity Career Gap

It seems like those interested in a career in cybersecurity should have no problems finding a job or advancing up the ladder. But problems in education, job listings and realistic expectations abound. More >

More Articles >

Interviews

Citrix CSO: Treating IT Security Symptoms Is the Problem, Not the Solution

Stan Black, chief security officer at Citrix Systems, says companies need to be focused on data analytics, machine learning, and an understanding of individuals’ roles.

More >

‘Security Operations Center’ Approach Is Fail-Safe Against Cyberattacks, CEO Says

A key line of defense will take the form of “security operations centers,” or SOCs. And with SMBs expected to be targeted more aggressively by the bad guys, making the SOC approach affordable is going to be essential.

More >

‘Real’ CRM Could Have Prevented Wells Fargo Fraud, CEO Says

The recent scandal at Wells Fargo could have been prevented if the right CRM system had been in place.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Editor's Choice

Seven Tips for Staying Employable in the ‘Smart Machine Age’

Ed Hess and Katherine Ludwig argue that adapting and staying employable in what they call the “Smart Machine Age” requires a willingness to learn new skills and to embrace certain behaviors.

 More >

Email Threat on the Inside

Oracle Dives into IoT as a Service

The Hyperconverged Approach to the Hybrid Cloud

Fine-Tuning the Enterprise Container Environment

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...

Security95-290x195.jpg Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships....

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.