|
Research/Infographic: ITS Partners Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More ▶ |
New and dynamic authentication factors can help prevent identity theft. The idea of using a fingerprint reader to log on to a smartphone is nothing new, but the latest wrinkle is the pressure with which that finger pushes on the reader. Read More ▶ |
|
Alienware’s first 13-inch VR gaming laptop features up to 7th Gen Intel Quad Core H- Class processors and NVIDIA GeForce GTX 10-Series graphics. For a limited time various configurations have been discounted up to $169 with free shipping. Read More ▶ |
|
Dean Nicolls, vice president of marketing at Infrascale, shares some tangible ways disaster recovery as a service (DRaaS) can pay big dividends and quickly restore systems in the wake of a ransomware attack. Read More ▶ |
|
|
Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement. Read More ▶ |
|
A consortium was recently created to make sure that your car stays on the road and in your control. Read More ▶ |
|
Finnish security vendor F-Secure released 34 pages of transcripts from the group chat used by the crafters of the Spora ransomware family. The transcripts give a whole new meaning to tech support. Read More ▶ |
|
A carder forum is advertising a special deal to VIP members. The website claims to possess more than 150 million logins, from a number of services including Netflix, and Uber. Read More ▶ |
|
Research/Infographic: ITS Partners Most everyone knows that as cloud adoption increases, the maturity of cloud security must also increase. But, before investing in the latest and greatest tools, we always recommend that CISOs start by defining what outcomes are important to them - defining what they want their cloud security system to accomplish. Download the infographic to uncover and evaluate the 11 critical outcomes you will need from your cloud defense solution. Read More ▶ |
Top 5 Stories |
Editor's Picks |