U.S. President Barack Obama pledged to punish Russia for hacking of Democratic groups and figures during the election season with actions that’ll occur in secret and others that’ll be made public. Read More ▶ |
|
| Virtual Event: WGroup As more IT services and applications are outsourced to third-party vendors, it becomes increasingly important for companies to understand how to effectively manage vendors and conduct governance meetings at predefined intervals. This allows organizations to take full advantage of IT-vendor relationships by providing the opportunity to strategize, review, align goals, and hold vendors accountable for their performance. Read More ▶ | On Friday, The LA County Chief Executive Office issued a public notice that 756,000 Californians were going to be receiving breach notification letters, after a single Phishing email scammed more than one hundred county employees. The notice also said a warrant has been issued for the Nigerian responsible for the Phishing attack. Read More ▶ |
| Also designed to be water resistant, this highly rated speaker's list price has been slashed 72%, down to just $27.99 on Amazon. Read More ▶ |
| There is much uncertainty surrounding the security industry for 2017. Many of the trepidations of experts in the field are directly connected to what the nation’s next president will do. Find out what else worries them. Read More ▶ |
| | You think you have your hands full as an IT pro now? Just wait until blockchain, IoT, augmented and virtual reality, and these other technologies really start to take hold in 2017. Read More ▶ |
| Lynda.com, the online skill learning unit of LinkedIn, has reset passwords for some of its users after it discovered recently that an unauthorized external party had accessed a database containing user data. Read More ▶ |
| Cybersecurity researchers will be considered guilty until they prove their innocence under proposed changes to The Privacy Act put forward by the Attorney-General’s department. Read More ▶ |
| Research/Infographic: Bay Dynamics Security Operations Centers are inundated with countless threat alerts from their various security tools. Incident responders sift through the pile, hoping they chase down the imminent ones, only to find out later that they wasted their time. White they were investigating what they thought was a high severity alerts, was in fact low in severity, leaving the true threat untouched and able to attack the organization. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|