Policies predefine how our organizations will protect against cyber incidents. They outline the processes that will be used on a daily basis as well as the steps to take when an incident occurs. Essentially, they do all the heavy thinking upfront so all you must do during an incident is execute. Read More ▶ | | | White Paper: Cisco Systems Find out the multiple ways to implement Cisco AMP, from the endpoint to the network, mobile devices, and virtual environments. Read More ▶ | If all the recent IT hiring surveys are to be believed, chief security officers can expect a pretty sweet year in 2016. Job demand is up. Salaries are way up. And neither trend is expected to slow anytime soon. Yes, good CSOs can pretty much write their own ticket in 2016. That is, if they can write a good resume. Read More ▶ | | Security professionals were less confident in their security infrastructure in 2015 than in 2014, according to a report released today by Cisco. Read More ▶ | | SplashID recently published its round-up of the worst passwords of 2015. '123456' and 'password' still reign supreme Read More ▶ | | | Char Yarema is of the generation of parents who did not grow up using technology, so her son, Jonathan Yarema, security consultant at Trustwave, has impressed upon her the importance of using caution and patience when surfing the web. Read More ▶ | | Video/Webcast: EMA Research Join David Monahan of EMA, and Wade Williamson, director of product marketing at Vectra Networks, on February 9th @11AM PST/ 2PM EST for this insightful webinar that explains how threat detection algorithms can replace your Big Data with better data. Read More ▶ | | | |
0 comments:
Post a Comment