According to an end user security survey released this morning, 72 percent of employees are willing to share confidential information. In the financial services sector, the percentage was even higher -- 81 percent said they should share sensitive, confidential or regulated information. Read More ▶ |
|
| Webcast: CA Technologies Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More ▶ | While blockchain technology may be a hotspot in data privacy, experts disagree about whether it’s a good fit for enterprises that have traditionally relied on centralized data control. Read More ▶ |
| This desk lamp features a sleek and minimalistic design with no buttons thanks to its creative touch sensitive panel, for control over multiple brightness and color temperature settings. Also features a USB port equipped with the iSmart technology for safer and faster charging. Read More ▶ |
| Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees? Read More ▶ |
| | The most popular instant messaging platforms with cyber criminals are Skype, Jabber and ICQ, according to a new report released this morning. Meanwhile, consumer-grade platforms like AOL Instant Messenger and Yahoo IM have fallen out of favor, while newer, more secure consumer oriented platforms like Telegram and WhatsApp are also gaining popularity. Read More ▶ |
| This article discusses DevOps security and the application security tools that need to be embedded within its process. These additions enable proper InfoSec protection of web applications. Read More ▶ |
| The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based security and centralized access. Legacy controls and architecture are due for replacement. This article asks and answers "What should replace them?" Read More ▶ |
| How to create a secure systems development practice in spite of Agile, DevOps and changing threats Read More ▶ |
| White Paper: Turbonomic In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how to identify and time the bursting of appropriate workloads. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|