|
eBook: CAST Highlight When deciding on which applications to keep, merge or retire, the process becomes a turf battle - influence and opinion becomes the driving factors in these decisions. By the time application quality/risk is taken into account, it's often too late to change course. Read More ▶ |
Data-driven defense uses an organization's own data to identify and mitigate the most important threats. Sounds good, but adoption will be met with resistance. Read More ▶ | |
For the first time, Amazon has discounted its Echo Spot device by $40 when you buy a pair of them. Read More ▶ | |
Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed. Read More ▶ | |
|
Cisco's Tetration analytics upgrade focuses on protecting data center workloads and detects potential application vulnerabilities. Read More ▶ | |
Azure Stack is Microsoft's on-premises version of its Azure cloud service, enabling customers to hold sensitive information within their own facilities but with the ability to reach the Azure public cloud, too. Read More ▶ | |
These cables from Anker are long and durable, and currently discounted a significant percentage off its typical list price. Read More ▶ | |
As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game of phishing. Watch Now ▶ | |
Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee. Read More ▶ | |
As mobile device use increases among U.S. government workers, IT and security officials are scrambling to better secure devices, leaving behind traditional anti-malware tools in favor of mobile threat detection and role-driven access rules. Read More ▶ | |
Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider. Read More ▶ | |
RFID devices can help track inventory, improve efficiency of healthcare and enhance services for premium customers in the hospitality industry. Read More ▶ | |
Learn how to find your way around SharePoint Online, create sites, share and manage documents, work with calendars, integrate with Outlook and more. Read More ▶ | |
Feel like you're not moving up? Here's how to tell whether you've hit a standstill in your current role — and how to steer your career out of the rut. Read More ▶ | |
Sponsor Article: BlueCat The Cyber Kill Chain model describes how attackers use a common cycle of methods to compromise an organization. IT security leaders can use this research to align security programs to adversaries and improve their ability to predict, prevent, detect and respond to threats. Read More ▶ |
0 comments:
Post a Comment