We will see shifts in ransomware, including how attackers will target victims, who they’ll target, and the role IoT will play in ransomware, both as an attack vector and attack target. More >
It seems like those interested in a career in cybersecurity should have no problems finding a job or advancing up the ladder. But problems in education, job listings and realistic expectations abound. More >
The top 25 IT security companies, according to Cybersecurity Ventures. More >
As consumers, and in turn as employees, we tend to be pretty haughty about our security IQ. Nearly two-thirds say they don’t believe they were a victim of a cyberattack, which is highly unlikely. More >
News this week included Charter's fixed wireless plans, big changes in tech trends, risks in connected cars, Bluetooth popularity, and Verizon's purchase of Skyward. More >
Small businesses need to step up their security process before disaster hits. More >
Stan Black, chief security officer at Citrix Systems, says companies need to be focused on data analytics, machine learning, and an understanding of individuals’ roles.More >
A key line of defense will take the form of “security operations centers,” or SOCs. And with SMBs expected to be targeted more aggressively by the bad guys, making the SOC approach affordable is going to be essential.More >
The recent scandal at Wells Fargo could have been prevented if the right CRM system had been in place.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
Ed Hess and Katherine Ludwig argue that adapting and staying employable in what they call the “Smart Machine Age” requires a willingness to learn new skills and to embrace certain behaviors.More >
This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...
This publication provides guidelines for establishing and participating in cyber threat information sharing relationships....
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...