This past weekend at SXSW, two Congressmen suggested that the U.S. create a cybersecurity reserves system, similar to the National Guard, but the idea has received a mixed welcome from the cybersecurity community Read More ▶ |
|
| Webcast: CA Technologies Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More ▶ | New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology. Read More ▶ |
| Plug in a Wemo Switch, download the free app, and start controlling your lights and appliances from anywhere in the world, right from your phone. Read More ▶ |
| When governments turn to private hackers to carry out state-sponsored attacks, as the FBI alleges Russia did in the 2014 breach of Yahoo, they're taking a big risk. Read More ▶ |
| | Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored. Read More ▶ |
| The biennial (ISC)2 report shows that the percentage of women in cybersecurity remains unchanged. Given the significant shortfall of security talent, what can we learn from this report about how to fix our weak and leaky pipeline? Read More ▶ |
| White Paper: Insight With big data comes both great reward and risk. Every company needs to secure and manage internal and customer data while also realizing its benefits and opportunities. No matter the size of the business, security professionals are challenged with striking a delicate balance between providing safe and intuitive access to users while reducing overall risk. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|