dcsimg

SECURITY ARCHIVES - Page 2

Four Reasons Why Data Breaches Continue

30 Mar, 2018

James Stickland, CEO of Veridium, details the four major reasons why data breaches continue to happen.

Majority of Organizations Admit to Being Unprepared for GDPR

28 Feb, 2018

Companies may believe they are ready for May 25 and GDPR, but is that really the case?

Equifax Breach Findings Show Why We Need GDPR

27 Feb, 2018

Data breaches are going to continue to happen. GDPR will require U.S. companies to be more forthright with EU residents in a breach aftermath. Will they be more open with Americans?

Why GDPR Must Be an Integral Part of Your GRC Framework

29 Jan, 2018

As you put together your governance, risk and compliance (GRC) framework, are you thinking about how the General Data Protection Regulation (GDPR) fits in?

For GRC to Be Effective, Employees Need to Be Better Aware of Security Practices

25 Jan, 2018

Having real leadership in GRC is not just important for implementing the strategy.

The GRC Framework and Cloud Security

24 Jan, 2018

The IT team has to be an integral part of the GRC team and a voice about the framework. It is also important to understand how your employees are playing a role in your cloud security.

BlackBerry Gets Jarvis to Secure the Connected Autonomous Car

19 Jan, 2018

We are reaching a critical stage for autonomous cars. They are going into broad trials and will soon start appearing in production. BlackBerry Jarvis addresses security problems.

Feeling Better: Health Care Apps, Digital Health and the Enterprise

27 Dec, 2017

The question of FDA approval raises the issue of how digital health tools are used and managed in the workplace. To some extent, the same common sense rules apply.

Will We See a Shift in Security Solutions in 2018?

26 Dec, 2017

Security professionals predict the solutions that will create positive change in the coming year.

Prediction: Social Impact of Cybersecurity Breakdowns

21 Dec, 2017

In 2018, we will see cybersecurity issues have a serious social impact. Security breakdowns will play a factor in our elections, in our relationships, and in our way of life.

Corning’s HPFS Is Enabling the Next Generation of Seeing Machines

20 Dec, 2017

HPFS is poised to revolutionize a variety of industries: security; defense; autonomous flying and driving vehicles; real-time medical scanners; and an increasingly intelligent flood of domestic, military and industrial robots.

Critical Infrastructure Continues to Be Under Cyber Threat

19 Dec, 2017

One of the most frightening of the many scary things in the modern world of telecommunications and IT is the infiltration of critical infrastructure (CI) by hackers.

Bugcrowd Adds VPN to Crowdsourced Penetration Testing Service

19 Dec, 2017

Crowdcontrol simplifies vulnerability discovery by providing IT organizations with access to a wide variety of professional penetration experts.

Oracle Cloud Service Looks to Unify IT Security and Compliance

19 Dec, 2017

The latest version of Oracle Identity SOC makes it possible to determine how changes to providing access to applications might impact the overall IT security posture of an organization.

Prediction: Health Care in the Security Crosshairs in 2018

19 Dec, 2017

The outlook for cybersecurity in health care is not great for next year, and it is time for industry to step up.

What Security Pros Need to Understand About the Dark Web

15 Dec, 2017

The Dark Web has many uses, both legal and illegal. Security professionals need to understand a set of terms that explain these activities.

Experts Recommend Security Priorities for 2018

14 Dec, 2017

Here are a few security issues that the experts recommend as priorities in the coming year.

Security Budgets in 2018: Predictions on Where IT Will Spend Security Dollars

13 Dec, 2017

Most experts agree that more organizations will increase their security budget in 2018. Here is what they will be spending that money on, and the reasons for skepticism about increasing budgets.

Predictions for 2018: Concerns Surrounding Cryptocurrency

11 Dec, 2017

In 2018, expect cryptocurrencies to be both the target of attacks and enablers of a growth in ransomware.

IBM Opens App Store for Identity Access Management Software

06 Dec, 2017

IBM Security App Exchange is intended to make it simpler for IT security teams to evaluate multiple approaches to multifactor authentication spanning everything from hardware-based tokens, to biometrics.

« Prev |  1 | 2|3 | 4 | 5 | 6 | Next » Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.