|
Video/Webcast: Ixia Reduce your attack surface with a security solution that sits in front of other security devices to provide dual-function protections: 1) Blocks traffic from known IP addresses; and 2) Blocks outbound bot communication from pre-existing infections. Read More ▶ |
When you have a big, ugly spreadsheet, logical formulas can help you make sense of it all by looking for results or patterns that you specify. We show you how to set up a simple one. Watch Now ▶ | |
At the 2016 RSA Conference, CSO's Steve Ragan chats with Fred Touchette from AppRiver about the latest phishing and email threats, and ways for companies and employees to become more aware about not falling for these threats (as well as ransomware). Watch Now ▶ | |
At the RSA Conference in San Francisco, Sol Cates, CSO of Vormetric, talks with CSO about why securing data at companies is getting more difficult. The company released its 2016 Data Threat Report at the show. Watch Now ▶ | |
|
Our roundup of intriguing new products from companies such as Microsoft, EMC and Digium. Read More ▶ | |
JE Dunn is using a Web-based portal, which incorporates 3D modeling software, to enable architects, project managers and other constituents to transform the way they share building information. Read More ▶ | |
Romania's highest court approved the temporary extradition to the U.S. of a convicted hacker who is accused of breaking into the email and social media accounts of a Bush family member and U.S. government officials. Read More ▶ | |
Implementing an IT infrastructure library (ITIL) can help organizations trying to get a better handle on IT services and resources. But ITIL's just a framework. One size does not fit all. In fact, you might not need it at all Here are seven questions to ask to find out if ITIL's right for you. Read More ▶ | |
There is no "one size fits all" approach for managing workers, and that's especially true for developers. Here are the 5 most common developer personalities—and tips on how to manage them. Read More ▶ | |
Bi-modal IT may be tech buzzwords du jour, but creating a separate department (often in its own physical space) to do nothing but pure R&D is still an enticing prospect for embracing the innovator's dilemma. Read More ▶ | |
Google's digital assistant can do way more than quickly search the web, once you learn all of its hidden tools. Read More ▶ | |
Apple and its supporters have contended that the creation of the tool requested by the FBI would dampen enthusiasm for software updates, reduce the country's overall cyber security and unleash a flood of similar demands from authoritarian governments worldwide. Read More ▶ | |
Many vendors still allow hard-coded passwords to ship out with their products Read More ▶ | |
Companies are finally stepping up to increase gender diversity in their tech workforce -- not for PR reasons, but because it's smart business. LinkedIn, Cisco, AmEx and GoDaddy share advice on how they're making headway. Read More ▶ | |
White Paper: Ixia Tolly compared Ixia and Gigamon for advanced packet processing. Ixia led on all performance metrics. Results proved Ixia's intelligent network packet broker delivers reliable, lossless visibility and cuts the risk of blind spots. Read More ▶ |
0 comments:
Post a Comment