On Saturday, Salted Hash received a Phishing email from a PR contact (the second one this year) that was targeting corporate credentials. Unlike the previous Phishing email received from a professional contact, this one was poorly implemented and broken. Read More ▶ |
|
| White Paper: Hewlett Packard Enterprise The adoption of public, private and hybrid cloud is rapidly expanding. As IT evolves from productivity enhancer to transformative business differentiator, and as organizations embrace new models of IT consumption, the role of enterprise IT departments is changing. Forward-looking IT groups are becoming internal service brokers to their organizations and they are adopting a multi-cloud approach to enable an IT-as-a-service model. Read More ▶ | Mike Tierney is back with a plan of action for security leaders on protecting company information Read More ▶ |
| If IT and Computer Science students learn the ins and outs from both sides of hacking, will they be better defenders? Read More ▶ |
| | | Gartner has taken a look at five key areas of security concern that businesses face this year and issued predictions on and recommendations about protecting networks and data from threats that will likely arise in each. Read More ▶ |
| Security teams handling Identity and access management (IAM) are hampered by dirty data and need data-cleansing help from a chief data officer, according to TechVision Research. To learn more, download the free report “Getting Your Identity Data Right.” Read More ▶ |
| Video/Webcast: EMA The latest research on application performance management (APM) from leading IT analyst firm Enterprise Management Associates (EMA) is a deep dive into the trends and requirements driving investments in APM solutions and the outcomes companies experience when such solutions are put in place. Join us July 14th @ 1PM PDT or 4PM EDT. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|