|
eBook: Nexthink Inc. It is no longer a question of if an organization will be compromised, it is when, and to what extent. Threats today begin with the end-users, and this is where security solutions need to look first. Read More ▶ |
A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident response plan so to reduce the impact of that data breach. Read More ▶ |
|
A new survey finds 76 percent of IT professionals with responsibility for security feel their security teams are brought in too late to have a meaningful impact on digital transformation projects. Read More ▶ |
|
Banks are under assault from cybercriminals at an alarming rate. Passwords, PINs, and secret questions all have significant limitations. Will biometrics save banks? Watch the video and lets discuss. (8 minutes) Read More ▶ |
|
|
Cybercrime is big business. We spend money to solve the problem, but perhaps our approach is all wrong. Maybe we need a top-down approach. For that to work, IT leaders must communicate effectively with the board of directors and C-level executives. Read More ▶ |
|
See more than 20 variants of these attacks through the years. Read More ▶ |
|
The U.S. Department of Human Services has released new guidance for health care companies that focuses on the growing threat of ransomware, stresses the need for better education and regular backups, and confirms that a ransomware attack against plain-text health information is, in fact, a breach that must be disclosed Read More ▶ |
|
Federal authorities have shut down several alleged tech support scammers working out of Florida, Iowa, Nevada and Canada, freezing their assets and seizing control of their businesses. Read More ▶ |
|
Every release of SQL Server promises increased performance, better security and improved business intelligence. You get all of that with SQL Server 2016, plus other strategic options such as cloud integration and Linux support. Read More ▶ |
|
Windows 10 breaches French law by collecting too much personal information from users and failing to secure it adequately, according to the French National Data Protection Commission (CNIL). Read More ▶ |
|
Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines. Read More ▶ |
|
White Paper: Delta Risk, LLC A spate of high-profile, high-impact cyber breaches at several of the largest financial institutions in the United States has brought attention to a point that cybersecurity professionals have long taken as an article of faith: boards of directors need to take an active role in the management of cyber risk. Yet, there are several factors that tend to prevent effective engagement in cybersecurity risk at the board level. Read More ▶ |
You have lots of good stuff to look forward to in the next major release of Windows 10. Here are the highlights. ▶ |
Every company may be a software company now, but that doesn’t mean you have to build it all yourself. When can you buy the same standard apps your competitors use? Why should you invest in building your own? And when you do build, how little code can you get away with? We explain. ▶ |