As vendors have become more important in the day-to-day functioning of businesses, companies need to ensure that their data is safe on these third-party networks. More >
Top trends for 2016 that will have a significant impact on organizations, end users and IT, create business disruptions, and require major investment. More >
Studies reveal that enterprises spend almost half a million to recover from a data breach; however, many still don't increase security efforts after. More >
The reality is that fragmentation is a bigger deal in the enterprise than the consumer sector. More >
Security experts can take steps to bridge the gap and help to reinforce best practices among their colleagues. More >
Several major data breaches may be part of a ripple effect. More >
As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.More >
A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.More >
A Symantec exec breaks down the three main categories of cybersecurity threats.More >
In their fourth year, the Tabby Awards are introducing a new category specifically for the best business smartphone apps -- the Mobby Awards/Business.
Riverbed CTO Hansang Bae says that rather than requiring IT to deploy and manage complex infrastructure inside the branch, Project Tiger will become the foundation through which storage and security services are provided in the branch office.
Everyone wants to do great things, but few actually do. Why? Most people are either afraid to think big, believe they don't have what it takes, or don't want to commit to putting in the kind of effort required to accomplish anything truly great.
IT hiring in 2016 is expected to continue to be a relatively fierce market, favoring employees looking for new positions.More >
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...
This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...