When protection fails, forensics can still prevail. Read More ▶ |
|
| White Paper: Qubole Inc From hiring practices to self-service technology and employee empowerment, our 5 Tips on Building a Data-Driven Culture will set you on a path to become a truly data-driven organization -- one that uses data to start, continue, or conclude every single business decision, no matter how major or minor. Read More ▶ | Officials confirm that a cyber attack caused issues during the 2018 Winter Olympics opening ceremony in PyeongChang. Read More ▶ |
| Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now. Read More ▶ |
| Everyone, from activists, journalists, CEOs, and politicians, walk around with a computer in their pocket, sometimes calling it a phone. This week on Salted Hash, we talk about mobile privacy and security with the founder of The Guardian Project, Nathan Freitas. Read More ▶ |
| | A document submitted by Equifax to the Senate Banking Committee shows attackers may have also stolen tax ID numbers, additional driver’s license and credit card details, email addresses and phone numbers. Read More ▶ |
| Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection. Read More ▶ |
| Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable. Read More ▶ |
| White Paper: Veeam Software This eBook will discuss Windows Server 2016 Virtualization, also known as Hyper-V 2016. Many Hyper-V components have evolved with each Microsoft release, and knowing this information is key to understanding the increased functionality and usability. Many of the new features require the basic usage of PowerShell. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|