dcsimg

Security

Articles

Rethinking Security as a Competitive Edge

We need to rethink security as a competitive edge and stop thinking of it as an impediment to getting business done. More >

Why Security Needs to Automate, Too

The same tools being used to augment the development and operations side of the house can also be applied to automation in security. More >

Top Mobile Application Management (MAM) Tools for the Enterprise in 2019

In some cases, mobile application management functionality is delivered in standalone MAM platforms. In others, it comes as a module in a broader suite of services. In either case, the tasks MAM performs are vital. More >

Mobile Application Management and the Enterprise

Mobile application management (MAM) focuses on supporting what is sent to and resides on the mobile device. Enterprises rely on MAM for a balance of security and functionality. More >

5G in 2019: Are We There Yet and Will It Be Secure?

5G will likely be a powerful asset to business operations, but is your security going to be able to keep up with it? More >

Supply Chain Security to Become a Higher Priority in 2019

Blockchain will transform the supply chain in 2019. More >

More Articles >

Interviews

CEO Shares Insights on Preventing Data Loss, Handling Data Breaches

Datacastle CEO Ron Faith discusses mitigating the risk around employees walking out the door with sensitive company data.

More >

Citrix CSO: Treating IT Security Symptoms Is the Problem, Not the Solution

Stan Black, chief security officer at Citrix Systems, says companies need to be focused on data analytics, machine learning, and an understanding of individuals’ roles.

More >

‘Security Operations Center’ Approach Is Fail-Safe Against Cyberattacks, CEO Says

A key line of defense will take the form of “security operations centers,” or SOCs. And with SMBs expected to be targeted more aggressively by the bad guys, making the SOC approach affordable is going to be essential.

More >

More Interviews >

Most Popular Features

Time to Set Realistic AI Expectations Is Now

The gap between what senior business execs believe can be accomplished by investing in AI and what can be really accomplished using AI has widened to the point where a backlash against AI in the enterprise may be all but inevitable.

Now Comes the Hard Part of Cloud Computing

Given all the complexities involved, it is little wonder that so many organizations have found moving to the cloud a much bigger challenge than they might have originally anticipated.

Why Security Needs to Automate, Too

The same tools being used to augment the development and operations side of the house can also be applied to automation in security.

Editor's Choice
Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...

Security95-290x195.jpg Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships....

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

More IT Downloads>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.