Security

Articles

5 Tips for Effectively Implementing a Desktop Virtualization Solution

With the threat of security breaches increasing exponentially, and continued BYOD use in several highly regulated industries like health care, VDI continues to grow in relevance and importance as a way to deliver security-by-design. More >

IT Pros Say Wearables Their Greatest IoT Security Threat

Will we actually see improved security for wearables and the IoT? That’s the real question. More >

Verizon’s Data Breach Investigations Report Shows Not Much Has Changed

One of the findings in the 2016 DBIR is that old vulnerabilities continue to be leveraged. More >

Health Care Security Facing Wide Open Vulnerabilities

Highly valuable data is flowing between patient and health care professionals, between those professionals, to and from insurance companies and even between machines. The scary part is that it appears to be haphazardly protected. More >

Cybercrime as Big Business

Cybercrime is big business. Cybercriminals like FIN6 are out to make a profit, just like any other big business. More >

IT Professionals Balk at Backdoors but Aren’t Diligent About Encryption

While many believe that encryption actually helps prevent data breaches, it isn’t as widely adopted as a security layer as one would think. More >

More Articles >

Interviews

Life as a Domain Name Registrar in a World of Internet Bad Guys

We talk with Rightside CEO Taryn Naidu about the trials and tribulations of operating as a domain name registrar.

More >

A Conversation About Cybersecurity with Lee Rossey, Co-Founder and CTO of SimSpace

Rossey shares his expertise on national security, personal privacy, what politicians should focus on right now in terms of cybersecurity, and what his company's customers are dealing with.

More >

Supply Chain Weakens Health Care Sector’s Cyberattack Defenses

The health care sector is an especially attractive target for cyberattacks, and especially vulnerable due to its weakest link: the supply chain.

More >

More Interviews >

Most Popular Features

5 Tips for Managing a Multi-Generational Workforce

To tap the full skill set of your multi-generational team, you'll likely need more agile management approaches and new communication tools.

How a Secret Strategy Helps BlackBerry and Microsoft Solve Government’s Mobile Problem

Agencies needed BlackBerry-like security protections demanded by government and a SharePoint-like product that people would actually use.

Best Practices to Improve IT and DevOps Collaboration

Together, IT support and DevOps could be exponentially successful. Unfortunately, a recent study found that the two groups don’t always collaborate successfully.

Editor's Choice

5 Tips for Effectively Implementing a Desktop Virtualization Solution

Security Staffing

With the threat of security breaches increasing exponentially, and continued BYOD use in several highly regulated industries like health care, VDI continues to grow in relevance and importance as a way to deliver security-by-design.

 More >

The Node.js Foundation Releases Update Aimed at the Enterprise

IBM Pushes Flash Modules into the Midrange

Verizon’s Data Breach Investigations Report Shows Not Much Has Changed

The Hidden Importance of an IT Analytics Tool Like BMC TrueSight Intelligence

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Checkbox1 National Checklist Program for IT Products – Guidelines for Checklist Users and Developers

This document makes recommendations for how users and developers should select checklists from the NIST National Checklist...

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...

Security29 Security of Interactive and Automated Access Management Using Secure Shell (SSH)

This publication assists organizations in understanding the basics of SSH interactive and automated access management in a...

Security35-290x195.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.