|
White Paper: RES Software As organizations strategize to best support their dynamic workforce, there are some important technologies trends that IT should have on their radar so projects don't sneak up on them. Learn how IT can prepare for Windows 10, Office 365 and more. Read More ▶ |
Security is not a one-time event. Ensuring threat resilience is your duty as a CIO. Reevaluate your company’s security situation often – everyone’s future depends on it. Read More ▶ |
|
Several weeks ago, a key member of the WatchGuard Technologies finance team was targeted by a spear phishing attempt. Find out what they did to track down the phisher. Read More ▶ |
|
If you are managing big ticket projects or sensitive data or both, 2016 is the year your project risk planning needs to change. Read More ▶ |
|
|
With great power comes great responsibility -- and also a great big target painted on your head. At least, that's the case lately with corporate boards of directors and cybercriminals launching spearphishing attacks Read More ▶ |
|
Acer recently revealed its online store was the victim of a data breach that lasted nearly a year. Read More ▶ |
|
Why spend your beach time this summer reading mystery novels when real world mysteries are swirling through the cyber sphere? These books have been recommended by your security peers. Read More ▶ |
|
In the last week, Wauchula Ghost has been attracting even more attention as he has been successfully compromising the twitter accounts of ISIS sympathizers, and posting gay porn on those accounts in retaliation for the Orlando attack. Read More ▶ |
|
Congress should block proposed changes to rules governing U.S. law enforcement investigations that could give law enforcement agencies new authority to hack thousands of computers, several tech and advocacy groups said. Read More ▶ |
|
Don’t be surprised if you see spam coming from the top websites in the world. Lax security standards are allowing anyone to “spoof” emails from some of the most-visited domains, according to new research. Read More ▶ |
|
Foote's latest data suggests security and devops will remain in high demand for some time -- but cloud pay is starting to slip Read More ▶ |
|
Security managers working with industrial control systems are increasingly concerned about security, and worried about insufficient information sharing in the industry, according to a new survey. Read More ▶ |
|
White Paper: Aruba, an HP Enterprise Company Mobile and IoT devices such as laptops, smartphones, and smart watches can now be found in most businesses, as users demand access to the corporate network from anywhere, anytime. Securing for BYOD is a conversation IT needs to have, but it doesn't have to be a painful one. Employ these 8 best practices to boost your network security and end those headaches for good. Read More ▶ |
The Analytics 50, a collaboration between Drexel University's LeBow College of Business and CIO.com, will recognize 50 of the most innovative analytics executives. Nominate your project today! ▶ |