Election hacking has become a key topic during this year's presidential elections, more so now that candidates and voters are being actively targeted by actors that are assumed to be acting with Russian support. In this modified edition of CSO Online's Hacked Opinions series, we explore the myths and realities of hacking an election, by speaking with a number of security experts. Read More ▶ |
|
| eBook: Kony Inc Today, the world runs on mobile-time. The speed, access and connectivity to conduct business on any device, anywhere is an enterprise-wide opportunity. Read More ▶ | "Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo. Read More ▶ |
| Evolving risks and business technologies shift focus in security budgets Read More ▶ |
| | Security guru Bruce Schneier reported recently that the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an effort to take down the internet is in the works. Read More ▶ |
| Hacker Guccifer 2.0 now claims to have hacked the Clinton Foundation, but the documents posted show Democratic campaign data from organizations already compromised. Read More ▶ |
| Yahoo has called a Reuters article about a secret email scanning program "misleading," and said no such system exists. Read More ▶ |
| White Paper: AppNeta IT/Network Ops teams need to build out an application performance team to measure and monitor the end-user experience of the business critical apps these organizations use every day. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|