|
Webcast: CA Technologies Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More ▶ |
McAfee has officially spun out from Intel, dumping the name Intel Security and under new majority ownership that has deep pockets to help the company more aggressively acquire technology via mergers and acquisitions to supplement its home-grown innovations. Read More ▶ |
|
Voter records, patient data, and CIO hacking tools were among the data stolen last month. Read More ▶ |
|
Ransomware grew into a $1 billion industry last year, and ransom payments now account for nearly 10 percent of the entire Bitcoin economy. Avoiding becoming part of that statistic requires good endpoint security and effective backups. But what if your defenses fail, your backups are inadequate, all attempts to restore the data fail, and you have to pay the ransom after all -- what do you do? Read More ▶ |
|
|
Corporate security pros can add a new task to their busy days: handling panicky employees worried about privacy who are using the onion router (Tor) browser as a way to protect their online activity. Read More ▶ |
|
Antivirus vendor Bitdefender has released a free decryption tool that works for any files affected by the Bart ransomware. Read More ▶ |
|
Three IT executives discuss their greatest cybersecurity fears and some of their favorite tools they use to quell them. Read More ▶ |
|
Two GoFundMe campaigns have raised more than US$290,000 in an effort to buy the web browsing histories of U.S. politicians after Congress voted to allow broadband providers to sell customers' personal information without their permission. Read More ▶ |
|
Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. Read More ▶ |
|
Video/Webcast: KnowBe4 The bad guys are just one gullible user click away from staging an all-out invasion. Watch this 2-minute video and learn how you can keep your users on their toes with security top of mind. Read More ▶ |
CIO Insider |
Editor's Picks |