Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from similar attacks. Read More ▶ |
|
| White Paper: Red Hat Red Hat Open Innovation Labs is an immersive residency that arms customers with the skills, tools, and process to deliver better software, more quickly, to meet the mandates of today's market. Read More ▶ | While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data. Read More ▶ |
| Online advertisers are losing billions to fraud, but one advertising network has successfully taken steps to clean up its platform. U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8 billion is lost to fraud. Read More ▶ |
| | The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies. Read More ▶ |
| One problem with what we tell employees about taking security precautions is that the precautions interfere with their jobs. Read More ▶ |
| | Security keys offer a more secure alternative to code-based two-factor authentication. Read More ▶ |
| eBook: Silver Peak Systems Inc As SD-WAN adoption continues to gain ground and go mainstream in 2017, the majority of initial enterprise deployments will be hybrid, leveraging both MPLS and a complement of broadband connectivity. Many enterprises already have some level of broadband connectivity to branch and remote locations, but these links often remain idle or are relegated to backup or disaster recovery (DR). Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|