The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them. Read More ▶ |
|
| Webcast: CA Technologies Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More ▶ | The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information. Read More ▶ |
| Powered by sealed, ten year lithium batteries to provide continuous protection for ten years without battery replacement, this CO alarm's modern, compact design allows easy tabletop or wall mount placement and displays CO levels along with room temp on a backlit display. Read More ▶ |
| Developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or to infect computers with malware. Read More ▶ |
| | CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma. Read More ▶ |
| They’re an example of big tech companies’ failure to take security seriously. Read More ▶ |
| Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks? Read More ▶ |
| Video/Webcast: PhishMe, Inc. Listen to PhishMe Threat Intelligence Expert, Brendan Griffin, to learn about the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware. Now more than ever, it has become more important to detect and interdict malware during the delivery phase. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|