Security

Articles

My Reaction When My Personal Information Was Compromised

When Sue Poremba's personal information was compromised in a cyberattack on Penn State's networks, she was left with a lot of questions and few answers. More >

Survey Reveals Message Supervision Plays a Growing Role in Risk Prevention

Overall, the study found that compliance is taking on a more significant role across organizations – moving beyond traditional archiving and e-discovery efforts, to add value to sales and marketing, HR, risk assessment and cybersecurity. More >

IRS the Latest in a Growing List of Repeat Security Breach Victims

The IRS revealed this week that hackers used its transcript service to breach the data on 100,000 U.S. taxpayers. More >

Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs

Cybersecurity threats are growing. To defend against increasing threats, agencies must comply with various cybersecurity mandates that often fail to take the user experience into account. More >

Commvault Extends File Sharing Capabilities

Edge Drive means that IT organizations can better serve the needs of their end users while continuing to provide a consistent set of data protection policies and procedures across all the endpoints. More >

Like Everything Else, Bots Are Going Mobile

Bot developers, like humans, are moving from traditional platforms to mobile, and we should expect to see those numbers grow in the coming year. More >

More Articles >

Interviews

MacKeeper Has More Work to Do to Clean Up Its Act

A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.

More >

A Conversation About Symantec’s 2015 Internet Security Threat Report

A Symantec exec breaks down the three main categories of cybersecurity threats.

More >

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.

More >

More Interviews >

Most Popular Features

Job Interview Tips: Talking About a Horrible Boss

Quick, name a horrible boss you've had (or have). Unless you've yet to hold a job, it's unlikely that you had any trouble bringing a name or two (or three) to mind.

IBM Embraces Open Source RAD Platform

Many organizations have application development backlogs, so IBM joined Ionic to help reduce that backlog using tools that are inherently cross platform.

Six Mistakes that Lead to Poor Enterprise Software Adoption

Enterprise software development is a massive undertaking. Yet, surveys show that more than half of businesses are flat-out terrible at getting users to adopt new software.

Editor's Choice

Key Principles to Web-Scaling a Network

Security Staffing

Gracefully supporting the "going viral" nature of our world is what the next generation of networks is all about, and it is starting to affect enterprises as much as content providers.

 More >

Atlassian Updates JIRA IT Service Platform

Commvault Extends File Sharing Capabilities

Dealing with Interruptions: Recognize the Seriousness of the Problem

802.11ac Wave 2 Is a Big Commitment

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...

Misc43 Guidelines for Smart Grid Cybersecurity

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date