Levi Gundert, vice president of intelligence and strategy at Recorded Future, will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not. Read More ▶ |
|
| Video/Webcast: Level 3 Cloud is not just a destination, but a business transformation. When organizations race to Hybrid IT, Level 3 finds there are some key considerations they may over look, such as they importance of their network, which can put their transformation at risk. This webcast discusses this journey. Read More ▶ | To protect from liability concerns, enterprises need something in writing so that everyone knows what to do upon finding an insider threat. Here are some suggestions from security experts. Read More ▶ |
| Forrester Research predicted last fall that the new president would confront a “cyber crisis” within the first 100 days. Experts say that’s an easy call – depending on how you define a crisis. Read More ▶ |
| | If you own a stuffed animal from CloudPets, then you may have been hacked. The company’s toys -- which can receive and send voice messages from children and parents -- have been involved in a serious data breach dealing with more than 800,000 user accounts. Read More ▶ |
| Research/Infographic: ITS Partners Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|