Security

Articles

6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. More >

The Yahoo Breach – Much Worse Than We Thought

The number of user accounts affected by Yahoo's security breach -- previously reported as 200 million -- turns out to be more like 500 million. More >

5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. More >

Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. More >

Probable Yahoo Breach Spotlights Risks of Free Email Services

The news puts a spotlight on the risks of free email services and, in turn, how it can put businesses at risk. More >

Securing the Industrial Internet of Things

The IIoT is the domain of industry, government and other realms, so it’s not surprising that IIoT security is very important, complex and daunting. More >

More Articles >

Interviews

4 Tips to Help Protect Proprietary Information When Employees Leave

The ease with which confidential information can be shared outside the company is a perennial headache for those charged with managing security.

More >

Cybercrime: Who Do You Call When There’s a Cybercrime?

We have built a regulatory framework that is ineffective at recognizing, let alone combatting, cybercrime.

More >

U.S. Offshoot of Germany’s SAP Focuses on Cybersecurity, ‘Information Fusion’

CEO talks about the work SAP NS2 is doing, especially in regard to serving U.S. military veterans.

More >

More Interviews >

Most Popular Features

7 Ways the Internet of Things Will Impact ITSM

Regardless of the pace at which businesses adopt the IoT, ITSM will have to evolve to deal with IoT-driven changes such as more connected nodes, data points and automation, all of which add complexity.

How Inhi Cho Suh Embodies What the Future of IBM Will Hopefully Be

A Korean-American whose family emigrated to the United States when she was five years old, Suh embodies what one hopes is the future of IBM.

5 Essential Skills for the IT Leader

Successful IT leaders have to have very specific skills, but still know how to run a team, meaning they must master the so-called soft skills that are not taught formally.

Related IT Downloads

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

Checkbox1 National Checklist Program for IT Products – Guidelines for Checklist Users and Developers

This document makes recommendations for how users and developers should select checklists from the NIST National Checklist...

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.