Phishing 101: Beware and Prepare this Holiday Season

With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks. More >

8 Important People to Connect with During a Major IT Incident

Restoration and resolution are only the tip of the major incident communication iceberg. Really effective major incident communication reaches out to a host of other people inside and outside the organization. More >

Adding a Human Element to Cybersecurity

If friendly hackers discovered vulnerabilities, how does that information mesh with behavior analytics as a way to add another layer to security detection and prevention? More >

10 Security Trends to Look for in 2016

So what is on the horizon for 2016? Most experts expect to see continued growth in mobile malware and even more security breaches, especially in the health care and financial industries. More >

Even Telephone Poles Are Getting Smarter

News this week included smart lightpoles, 5G, bad news for municipal broadband, the scary side of the IoT, and licensed and unlicensed spectrum issues. More >

How to Minimize the Impact of BYOD and Improve Security

The infusion of personal devices, apps and networks into the corporate environment presents a significant security challenge, and is complicated by the presence of assets not fully under the IT department's control. More >

More Articles >


Dwelling on Security Concerns Can Stifle Innovation, CTO Says

Wolfram Jost, chief technology officer at the German enterprise software giant, Software AG, shares candid thoughts on security, software and the coming age of platforms.

More >

Collaboration Between HR, IT Essential to Prevent Data Breaches, HR Exec Says

As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.

More >

MacKeeper Has More Work to Do to Clean Up Its Act

A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.

More >

More Interviews >

Most Popular Features

Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their Q4 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.

Sizing Up the Internet of Things

The amount of new ground that needs to be broken in order to bring the IoT from the test bed to full production environments is substantial, more so than virtually every other technology initiative we’ve seen so far.

CES Announces the Most Innovative Tech Products for 2016

CES recently announced the honorees for its 2016 Best of Innovation award, a yearly competition that seeks out the best designs and engineering advancements in technology products.

Related IT Downloads

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...

Security29 Security of Interactive and Automated Access Management Using Secure Shell (SSH)

This publication assists organizations in understanding the basics of SSH interactive and automated access management in a...

Security35-290x195.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...

Security28 Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.