Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security threats over a two-year period. Here are the top 9 threats to watch for through 2017. Read More |
|
Resource compliments of: Gartner Security & Risk Management Summit Gartner Security & Risk Management Summit, June 8 11, in National Harbor, MD, shows you how to stay ahead of increasing threats, align security/risk strategies with enterprise objectives, assure compliance with new regulatory, compliance, privacy, and e-discovery requirements, and more. You can also earn CPE towards ISACA, (ISC)2 and DRII. Record turnout expected! Register today and save $200 on the standard registration rate when you use priority code SECPA1. |
|
In this Issue |
|
White Paper: SnapLogic This whitepaper outlines the changes occurring in big data and the emerging patterns for big data integration. Learn more. |
|
Experts recommend fighting back against CryptoWall and other ransomware, but for many the $500 ransom is a small price to pay. Read More |
Members of the British Airways loyalty program have been the victims of a data breach with some users accounts frozen until British Airways concludes their investigations Read More |
The state of Indiana is having a bad week. First, Governor Mike Pence signed a controversial "religious freedom" bill into law; now, twenty-four hours later, the state's website was knocked offline by a group taking up another person's protest against Religious Freedom Restoration Act. Read More |
Although 68 percent of companies said they are prepared for a breach, 75 percent estimated it would take hours, days, or weeks for them to notice that one had occurred Read More |
Editor's Picks - 15 hot, new security and privacy apps for Android and iOS
- How to get creative with your penetration testing
- 5 security bolstering strategies that won't break the bank
- What's wrong with this picture?The NEW clean desk test
- Inside an attack by the Syrian Electronic Army
Join the IDG Contributor Network The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today. |
0 comments:
Post a Comment