|
White Paper: Wombat Security Technologies This whitepaper provides an overview of security risks facing organizations that do not have a measuable security awareness program in place and how to overcome the common obstacles facing IT managers and CISOs today. Read More ▶ |
Click fraud is more than just a marketing problem. It presents a real security risk to your organization, experts say. CIOs need to know their enemy. Read More ▶ |
|
The impact of the United Kingdom voting to withdraw from the European Union could have far-reaching implications for international companies who experts say may need to rethink their data management policies as the move could create a network of disparate data sovereignty laws across Europe. Read More ▶ |
|
A U.S. senator has stalled an intelligence budget bill over concerns that it would expand surveillance while limiting oversight of it. Read More ▶ |
|
|
Hadoop distribution vendor, Hortonworks, announced HDP 2.5 at Hadoop Summit, along with an expansion to its Partnerworks program and a reseller agreement with self-service BI on Hadoop specialist AtScale. Read More ▶ |
|
Hackers are stealing credit card information in Europe with malware that can spoof the user interfaces of Uber, WhatsApp and Google Play. Read More ▶ |
|
A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers. Read More ▶ |
|
The infrastructure used by an Iranian cyberespionage group to control infected computers has been hijacked by security researchers. Read More ▶ |
|
A database described by some as a “terrorism blacklist” has fallen into the hands of a white-hat hacker who may decide to leak it online. Read More ▶ |
|
Here are nine areas of a network surveillance system that are most vulnerable, and how IT departments, with their security and facility management departments, can mitigate those risks. Read More ▶ |
|
White Paper: Wombat Security Technologies Our annual State of the Phish research reports found that phishing attacks continue to grow in volume and complexity, supported by more aggressive social engineering practices that make phishing more difficult to prevent. Key findings include data on personalized spear phishing, industry breakdown, and endpoint vulnerability. Read More ▶ |
The Analytics 50, a collaboration between Drexel University's LeBow College of Business and CIO.com, will recognize 50 of the most innovative analytics executives. Nominate your project today! ▶ |