Any helpfulness when it comes to improving security of the customers will go a long way in keeping those same customers happy and returning at other times of the year. More >
Making Identity Mixer as a service that developers can invoke via an application programming interface (API) should considerably reduce the amount of inherent risk that organizations face when conducting transactions on the Web. More >
In time for the busiest shopping and travel (and probably overall credit card use) time of the year, we are seeing a number of new Point-of-Sale (PoS) malware and PoS-related breaches. More >
With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks. More >
Restoration and resolution are only the tip of the major incident communication iceberg. Really effective major incident communication reaches out to a host of other people inside and outside the organization. More >
If friendly hackers discovered vulnerabilities, how does that information mesh with behavior analytics as a way to add another layer to security detection and prevention? More >
Wolfram Jost, chief technology officer at the German enterprise software giant, Software AG, shares candid thoughts on security, software and the coming age of platforms.More >
As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.More >
A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.More >
With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks.
Fixing a CEO is easy. You either mentor them properly or replace them. But once a board goes bad, there is no easy recovery.
Cybersecurity Ventures recently announced their Q4 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.
Learn how retailers who are armed with on-demand data can make split-second adjustments to capture a bigger slice of holiday spending and make 2015 their best year ever.More >
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...
This publication assists organizations in understanding the basics of SSH interactive and automated access management in a...
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...