The reality is that fragmentation is a bigger deal in the enterprise than the consumer sector. More >
Security experts can take steps to bridge the gap and help to reinforce best practices among their colleagues. More >
Several major data breaches may be part of a ripple effect. More >
Classes are officially in session. What better time than the start of a new school year to brush up on your cloud security knowledge? More >
News this week included general availability of GE Predix for data analytics, a large Android vulnerability, Nest's Weave application layer and quantum computing. More >
A surprisingly diverse number of opinions were revealed about the current status of IoT adoption, where it will be in the future, and how to leverage it today. More >
As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.More >
A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.More >
A Symantec exec breaks down the three main categories of cybersecurity threats.More >
In their fourth year, the Tabby Awards are introducing a new category specifically for the best business smartphone apps -- the Mobby Awards/Business.
Riverbed CTO Hansang Bae says that rather than requiring IT to deploy and manage complex infrastructure inside the branch, Project Tiger will become the foundation through which storage and security services are provided in the branch office.
Everyone wants to do great things, but few actually do. Why? Most people are either afraid to think big, believe they don't have what it takes, or don't want to commit to putting in the kind of effort required to accomplish anything truly great.
Developers need time-saving tools to help reduce the time to market. Here are five ways to build a successful developer ecosystem around your APIs.More >
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...
This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...