Security

Articles

Are You One Password Away from a Data Breach?

To help improve overall cybersecurity practices, the first line of defense is often an educated user with strong password practices. More >

Hillary Clinton’s Email, CEOs and Corporate Policy

Clinton’s policy violation brings to mind CEO behaviors in which the top person in a company thinks that rules don’t apply to him or her. More >

A Year After the OPM Breach Federal Agencies Still Fail at Cybersecurity

It all comes down to accountability, and federal agencies are severely lacking when it comes to cybersecurity-related accountability. More >

How Self-Encrypting SSDs Enhance Data Security

Hardware-based encryption is a much stronger and more reliable option for protecting data than software-based encryption or, worst case scenario, no encryption at all. More >

Logicworks Automates AWS Security

Logicworks has developed Cloud Patrol, an addition to its line of managed services for AWS, that makes sure IT security policies are consistently applied. More >

Cybercriminals as Business Competitors

If cybercriminals are treating crime as a viable business operation, shouldn’t you be thinking about cybersecurity in business terms, too? More >

More Articles >

Interviews

Life as a Domain Name Registrar in a World of Internet Bad Guys

We talk with Rightside CEO Taryn Naidu about the trials and tribulations of operating as a domain name registrar.

More >

A Conversation About Cybersecurity with Lee Rossey, Co-Founder and CTO of SimSpace

Rossey shares his expertise on national security, personal privacy, what politicians should focus on right now in terms of cybersecurity, and what his company's customers are dealing with.

More >

Supply Chain Weakens Health Care Sector’s Cyberattack Defenses

The health care sector is an especially attractive target for cyberattacks, and especially vulnerable due to its weakest link: the supply chain.

More >

More Interviews >

Most Popular Features

Top 25 Cybersecurity Companies to Watch in 2016

Cybersecurity Ventures recently announced their Q2 2016 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.

LinkedIn Open Sources Distributed Object Storage Software

LinkedIn developed Ambry because it could not find a storage solution that addressed horizontal scalability, availability and active-active data center configurations.

5 Data Warehouse Design Mistakes to Avoid

If you are designing a data warehouse, you need to map out all the areas where there is a potential for your project to fail, before you begin.

Editor's Choice

10 Hot New Tech Gadgets

Security Staffing

Check out some of these great finds, including unlimited external storage for iOS devices, laptops and desktops; a Bluetooth-enabled, interactive speaker, earbuds, a versatile 2-in-1 tablet; and charging options for mobile devices.

 More >

Citrix Bolsters Workspace-as-a-Service Strategy

Brocade Moves to Automate Network Management

IT Vendors and the Uber Effect

Is HPE Done? CSC Deal Another Nail in the Coffin

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Checkbox1 National Checklist Program for IT Products – Guidelines for Checklist Users and Developers

This document makes recommendations for how users and developers should select checklists from the NIST National Checklist...

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...

Security29 Security of Interactive and Automated Access Management Using Secure Shell (SSH)

This publication assists organizations in understanding the basics of SSH interactive and automated access management in a...

Security35-290x195.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.