|
White Paper: Veriato, Inc. Risk is one of those subjective concepts that usually fall into vague categories like "low" and "high" - which has very little meaning on its own, and only has value when you tie those categories to actions (which we will cover later in this guide). Read More ▶ |
Enforcement of the European Union's General Data Protection Regulation (GDPR) is set to start in about 18 months, giving regulators the ability to levy massive fines. Getting ready may require a data protection officer Read More ▶ |
|
Ironically, cyber criminals have to battle fraudsters too. To help them, a new web service is warning the hacker community who among them can’t be trusted. Read More ▶ |
|
LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by network filters to allow HR departments the freedom to communicate with prospective job candidates. Read More ▶ |
|
|
Of the Everests that IT faces daily, identity and access management is a particular challenge. These 10 questions help you find a solution that delivers what you need. Read More ▶ |
|
About three months ago, an instructor at Gurnick Academy, a California-based nursing school, had his biggest fear come alive. When he tried to access his lectures, the files were encrypted. The teacher was literally locked out of his classroom. Read More ▶ |
|
In a year marked by massive data breaches, trends report finds skimming and phishing made waves in 2016. Read More ▶ |
|
Tired of conventional passwords? So is Nuance Communication, a tech firm that is promoting the human voice as a way to secure user accounts. Read More ▶ |
|
Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in order to attack the perimeter. Read More ▶ |
|
Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment. Read More ▶ |
|
Even after being given a new, secure device just before his inauguration, President Trump still reportedly uses his old phone. Read More ▶ |
|
Facebook beefs up its two-factor authentication with support for security keys over NFC on Android phones. Read More ▶ |
|
White Paper: Cloudian Most data protection solutions make you choose between two imperfect storage options: high-cost disk or high-maintenance tape. There is a third option: object storage as a backup target. This analyst research note discusses how object storage works, how it uniquely solves the data protection challenge, and how it helps you meet your backup SLAs at 70% less cost than purpose-build backup appliances. Read More ▶ |
CIO Insider |
Editor's Picks |