Security

Articles

Basic Security Practice Failure Leads to Massive RNC Data Leak

You’d think that after all the news about the DNC’s hacked and released emails and Russia infiltrating voter software and manipulating elections, the RNC would have made sure it stepped up its own security. More >

IT Departments Struggle to Secure All Endpoints

How many endpoints are connected to your network? Can you answer that question confidently? More >

On-Demand Webinar: The Myths and Truths of Building a World-Class Cyber Defense

Explore three case studies of Fortune 500 organizations that struggled with the myths surrounding cybersecurity frameworks, technologies, and most importantly, people. More >

New Malware Could Threaten Critical Infrastructure

A recently discovered malware threat could crash critical infrastructure, and it is believed this malware is what took down Ukraine’s power grid late last year. More >

Webinar: Application Security in the Age of Open Source

The explosion in open source use has not been accompanied by effective security and management practices. More >

IT Departments Aren’t Prepared for Security Risks

Although they seem like a logical fit, IT and security don’t necessarily go hand-in-hand. They are different skill sets, and when we ask IT to perform security jobs without having the right skills, we are going to have an organization that falls into that 74 percent unprepared for security threats. More >

More Articles >

Interviews

CEO Shares Insights on Preventing Data Loss, Handling Data Breaches

Datacastle CEO Ron Faith discusses mitigating the risk around employees walking out the door with sensitive company data.

More >

Citrix CSO: Treating IT Security Symptoms Is the Problem, Not the Solution

Stan Black, chief security officer at Citrix Systems, says companies need to be focused on data analytics, machine learning, and an understanding of individuals’ roles.

More >

‘Security Operations Center’ Approach Is Fail-Safe Against Cyberattacks, CEO Says

A key line of defense will take the form of “security operations centers,” or SOCs. And with SMBs expected to be targeted more aggressively by the bad guys, making the SOC approach affordable is going to be essential.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series uses 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Editor's Choice

Don’t Fear the Breach; Do Fear the Misinformation

Security isn’t just about endpoint protection and data breaches. We are working and living in a world without true boundaries and where misinformation meant to cause damage is spreading as quickly as real information.

 More >

VM Density: A Question of Balance

How to Demonstrate ROI to Avoid Slashing the Training Budget

IT Automation Has Only Just Begun

Laptop Bans: Air Flight a Front Line in the War Against Terror

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...

Security95-290x195.jpg Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships....

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.