Security

Articles

Top Barriers to Effective Vulnerability Risk Management

When it comes to the effectiveness of traditional vulnerability risk management programs, the challenges are often rooted in the process itself. More >

Point of Sale Malware on the Rise

Several sources are reporting new POS malware hitting retail businesses, and a Dell study reveals lack of upgrades and maintenance to be one problem behind the attacks. More >

IBM to Share Security Intelligence via Online Portal

IBM is trying to create a community through which IT security professionals can collaborate to better identify threats and share alerts. More >

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense. More >

Law Enforcement Is Powerless Against Cybercriminals: Ransomware and Scams

As Rob Enderle has discovered, even police departments aren't safe from the latest ransomware and scams. More >

Verizon on Mobile Security Threats: Nothing to Worry About

The Verizon report should be met with a certain amount of skepticism because painting a bright picture serves the carrier that makes its money based on its network being used. More >

More Articles >

Interviews

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.

More >

IAPP’s New Privacy Certification Addresses Emerging Landscape

New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.

More >

Making VDI More Secure

Don't ignore these potentially serious vulnerabilities.

More >

More Interviews >

Most Popular Features

Five Hidden Risks with Public Cloud Usage

While many enterprises are clearly realizing promised benefits from public clouds, there are still challenges and a consistent set of concerns.

The Seven Ways to Review Code Like a Boss

The code review, or in developer parlance, the pull request, is the number one way to set the tone, rhythm and bar needed to build a high-performing team.

The Linux Foundation Starts Open Source Encryption Project

The Linux Foundation's Let’s Encrypt project will reduce the effort it takes to encrypt data in an application down to two simple commands.

Related IT Downloads

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...

Misc43 Guidelines for Smart Grid Cybersecurity

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date