Tychon’s Chief Technology Officer Travis Rosiek offers tips for enterprises on how to analyze former phishing attacks to improve defenses against future attacks, such as creating a database of captured phishing emails to learn tactics, who is being targeted and what information was used for social engineering. Read More ▶ |
|
| White Paper: Pyramid Analytics In the journey to become more data-driven in decision making, we are seeing unprecedented democratization of data and adoption of self-service analytics. Rigid data collection and reporting processes of the past have given way to rapid gathering of raw, unstructured and crowdsourced data. Read More ▶ | An expert at Brown University provides a counterpoint to an earlier story on why you don't need to study security in college. Read More ▶ |
| Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted Read More ▶ |
| LG's latest flagship is quite a good phone, and it gets even better with the right tweaks. Read More ▶ |
| | It would sure make things simple if there were one easy and obvious way to get a job or start a successful business in IT security. But it would also cut off a lot of potential career paths. We spoke to a host of different IT security pros and found that indeed there wasn't just one route to that coveted job. Read More ▶ |
| Microsoft launched Windows 3.1 on April 6, 1992. What made it so innovative 25 years ago? Let's take a stroll down memory lane in this slideshow. Read More ▶ |
| White Paper: Smarsh State, federal, and local government agencies need to keep important records (including digital communications) for a long time, to stay in compliance with public records laws, open meeting, Freedom of Information Act (FOIA), and various state sunshine laws. If an agency has email, social media, web and other digital communications related to business activities, records must be available to anyone who asks for them. Read More ▶ |
|
|
|