During the overnight hours of Saturday night and Sunday morning May 23-24, heavy rain in the Texas Hill Country triggered a flash flood of near-Biblical proportions in Wimberley and San Marcos. This is the story of a disaster response program executed exceptionally well. Read More |
|
Webcast: RSA Watch this 2-minute video to find out how an intelligence driven security framework balances prevention, detection, and response equally. Learn More |
|
In this Issue |
|
: PC Connection Larson & Darby uses Autodesk AutoCAD with HP Z Workstations, enabling it to compete effectively with larger firms in the tech-heavy Architecture/Engineering/Construction (AEC) industry. Learn More |
|
Businesses should have data-breach incident response plans in place, but even if they do they'll need to follow certain steps to accomplish the main goal of any such cleanup: getting the network back to supporting business as usual as quickly as possible. Read More |
Phishing scammers have busy middle managers in the crosshairs. Here's how to avoid being a victim. Read More |
Cheesy headlines aside, Netwrix, a firm that focuses on change and configuration auditing, has published a curious list of steps that are said to be the key in preventing a data breach. Yet, if these three steps are all that's needed, why hasn't everyone in InfoSec done this already and called it a day? Read More |
Whether you need to comply with PCI or not, recent changes to the QSA program signal the need for security leaders to engage in two important discussions. Read More |
In a recent analysis of a quarter million endpoint devices in 40 enterprises, every single corporate network showed evidence of a targeted intrusion but most of the activity was not yet at the most-dangerous data exfiltration stage. Read More |
Whether you want to lower your cell phone bill or find true love, there's usually a way around your problems. Read More |
Editor's Picks - 15 hot, new security and privacy apps for Android and iOS
- How to get creative with your penetration testing
- 5 security bolstering strategies that won't break the bank
- What's wrong with this picture?The NEW clean desk test
- Inside an attack by the Syrian Electronic Army
|
0 comments:
Post a Comment