The Federal Bureau of Investigation has got millions of dollars worth of rewards waiting for those who can help them nab these accused cyber thieves, spies and fraudsters.
Cybersecurity job openings are looking for people with a blend of technical, security, and industry-specific talents -- and it helps to know Python, Hadoop, MongoDB, and other big-data analysis tools, too.
Everybody likes to focus on the top 10 vulnerabilities but I've never found a company with a top 10 vulnerabilities problem. Every company has a different top 10.
Attend this webinar to learn how to gain a competitive advantage by delivering the very best user experience with improvements based on actual application performance, including mobile, mainframe, on-premises infrastructure, the cloud, and user feedback.
Despite millions spent each year on security, breaches still persist thanks to the compromised user credentials. How can you make the most of your existing security investments, while ensuring those who access your network are who they say they are?
The indictment of five Iranian hackers three years after the fact raises the question: Is naming them a worthwhile part of the threat defense lifecycle, or is it a meaningless distraction?
When vetting a cloud or SaaS provider, it is imperative that you find out how they handle data security and privacy. Here are some key questions to ask.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.