Millions of point-of-sale systems and hotel room locks can be hacked by temporarily placing a small, inexpensive device several inches away from their card readers. Read More ▶ | | | White Paper: 8x8 Inc Your traditional PBX has served you well. In all likelihood, it's already paid for. So you have a certain incentive to stick with it. That may seem like a safe choice on the surface. After all, changing your communications system is a significant undertaking and entails a certain amount of risk. However, it may be far riskier to stay with an out-of-date and under performing on-premises PBX. Read More ▶ | As this is my first venture into the world of blogs for CSO, the timing coincides with one of my favorite summer activities—traveling each August to the American desert, to roast in the Nevada sun, and attend the Black Hat Briefings. While kibitzing with scores of friends, colleagues, kindred spirits, security mavens, hackers, cybercops, groupies and of course, "Feds," I thought it fitting to pay homage to the place—for me any way—where the theater of "Cyber Security" all came alive. Read More ▶ | | The web is an incredible place, filled with a slew of programs and apps designed to help you get the most out of your PC. But which ones do you pick? Fortunately, the Ultimate PC Bundle is here, and it has curated 10 top-rated productivity, entertainment, and performance programs designed to breathe new life into your PC for only $39.99. Read More ▶ | | The purpose of a cyber risk profile is to assess your organization's insurability. The work you do upfront can go a long way toward ensuring you get adequate cyber insurance coverage and a better rate to boot. Read More ▶ | | | With strong authentication, you can work securely across devices and locations, reduce IT burden and control costs, and secure consumer access to your data. Symantec's Information Protection Team offers tips for addressing common business challenges when it comes to protecting your company data. Read More ▶ | | The hardware and software to make iris scanning a key feature is now in place for smartphones and PCs. Read More ▶ | | Cloud providers have raised awareness of third party risks to security Read More ▶ | | Yahoo users might want to reset their passwords. A hacker claims to have stolen the login information for 200 million Yahoo accounts and is selling them on the black market. Read More ▶ | | Video/Webcast: 8x8 Inc Demos don't have to be boring! Watch our whimsical 88-second video where we show how Jim is able to use his one phone number from 8x8 to take client calls anywhere, anytime on any device, much to the amazement and confusion of his customer, Sean. Read More ▶ | Top 5 Stories | Editor's Picks | | | |
0 comments:
Post a Comment