|
White Paper: Verizon Learn from our data breach investigations. We investigate hundreds of data breaches every year. Take a look at our case files. Read More ▶ |
As critical as it is, protection will fail. You need robust detection as well. Read More ▶ |
|
While CIOs have shored up PCs and software systems for years, they should start to look at video conferencing systems, webcams and other inconspicuous network devices, which can be exploited to trigger devastating DDOS attacks. Read More ▶ |
|
On the heels of massive IoT-enabled DDoS attack, security experts make their pitches to SIMposium 2016 attendees Read More ▶ |
|
|
The latest WikiLeaks revelations included a reminder that there are revealing things that just can’t be encrypted. Read More ▶ |
|
A team made up of executives from Aruba Networks and Panzura are out with a new self-funded startup this week that aims to deploy security tools that enterprises use in their campus and extend it to the cloud. Read More ▶ |
|
It's still unclear who pulled off Friday's massive internet disruption, but the malware largely responsible for the cyber attack has since been found assaulting new targets -- possibly video gamers. Read More ▶ |
|
A Pennsylvania man was sentenced to 18 months in federal prison on charges of hacking the Google and Apple email accounts of over 100 people including celebrities, and getting access to nude videos and photographs of some people. Read More ▶ |
|
The Australian Red Cross said its blood donor service has found that registration information of 550,000 donors had been compromised, which the agency blamed on human error by a third-party contractor. Read More ▶ |
|
To gain the security skills most needed at many companies, students and graduates will have to take a counterintuitive approach to their education and career. Whether just entering college or recently graduated, Shawn Burke, Global CSO, Sungard AS, details how to get started. Read More ▶ |
|
White Paper: Lookout Mobile Security Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android. Read More ▶ |
Whether you cut your teeth on Unix and AIX or you tire of doing the necessary but thankless tasks that come with keeping the lights on and the datacenter humming, there's still time to reinvent yourself. Here's how. ▶ |
Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP. ▶ |
Computerworld's annual salary survey shines a bright light on IT compensation. The more respondents, the better the results will be – and participants can enter a drawing to win 1 of 3 $500 American Express gift checks. Take the 2017 IT Salary Survey. ▶ |