With new hacking techniques, malware, viruses and threats being created faster than Melisandre's demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers pulled straight out of Westeros. Read More ▶ | | | White Paper: IBM Corporation In this digital age, 'disruption' is a term we hear a lot about. It can be defined as "A disturbance that interrupts an event, activity, or process" In the context of this paper it means competition appearing from unexpected quarters that rapidly takes business away from traditional suppliers. Read More ▶ | The purpose of a cyber risk profile is to assess your organization's insurability. The work you do upfront can go a long way toward ensuring you get adequate cyber insurance coverage and a better rate to boot. Read More ▶ | | Should health IT programmers working on biobanks and similar projects be held to the same ethical standards as doctors and other medical professionals? Read More ▶ | | Passwords are a problem, and yet they're the primary means of authentication used when at work or at home. Recently, Salted Hash examined 126,357 passwords for accounts compromised during Phishing attacks in 2016. What we discovered was both sad and frustrating. Read More ▶ | | | Suzanne Vautrinot's impressive cybersecurity experience has been in high demand since she retired from the U.S. Air Force in October 2013. As a major general and commander, she helped create the DoD's U.S. Cyber Command and led the Air Force's IT and online battle group. Read More ▶ | | White Paper: IBM Corporation Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own apps for specific job tasks. Read More ▶ | Top 5 Stories | Editor's Picks | | | |
0 comments:
Post a Comment