The biggest concern of DDoS attacks isn’t the frequency with which they are happening but how powerful they’ve become. More >
If you put aside safety, it is easy to argue that a user-focused company should let users run whatever version of the OS they want to run. But we have to consider security now. More >
AI may not solve every IT security issue. But it can go a long way to helping IT organizations address IT security issues at scale. More >
Enigma Software, maker of the SpyHunter anti-malware tool, talks about patterns in our computing behavior. More >
Unified communications (UC) continues to be IT’s version of the high school student who yearns to sit at the cool kids’ table but never quite makes it. More >
Cloud security is no longer seen as such a vulnerability and businesses in every sector are now confidently adopting the technology despite the sensitive nature of the information they hold. More >
The health care sector is an especially attractive target for cyberattacks, and especially vulnerable due to its weakest link: the supply chain.More >
Wolfram Jost, chief technology officer at the German enterprise software giant, Software AG, shares candid thoughts on security, software and the coming age of platforms.More >
As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.More >
With a shortage in qualified applicants for in-demand tech positions, IT pros have the luxury of being selective about the jobs they choose. So which are the best tech jobs for 2016?
As part of its fight to return to relevance, BlackBerry has embraced other platforms this week.
Cybersecurity Ventures recently announced their Q1 2016 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.
Even small changes can have a big impact on the success of managing IT tickets. Here are 10 steps organizations can use to keep their help desk from spinning out of control.More >
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist...
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...
This publication assists organizations in understanding the basics of SSH interactive and automated access management in a...
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...