Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around, but it can be a losing battle. Read More ▶ |
|
| White Paper: Leidos A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More ▶ | Here are the IT skills that will be in high demand for 2017. Read More ▶ |
| Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers, enterprises, and hackers alike. Read More ▶ |
| | Aqua’s CTO, Amir Jerbi suggests some key things DevOps should know about securing containerized applications. Read More ▶ |
| Mobile security company Zimperium is putting out the alert to make sure users are cognizant of these apps when they head into app stores. Read More ▶ |
| RSA Conference 2017 will take on the threat posed by the internet of things, something that was demonstrated last fall by the DDoS attacks that took down Dyn data centers and many of the high-profile Websites it supports. Read More ▶ |
| White Paper: Leidos A comprehensive look into how organizations can develop and implement a successful insider threat detection program. This white paper outlines the five steps to success: Gain Leadership Support, Leverage the Latest Technology, Develop a Communications Plan, Execute a Training and Awareness Campaign, Establish a Governance Structure Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|