|
White Paper: Veracode Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Read More ▶ |
Ajay Arora, CEO & Co-founder of data security startup Vera, shares insight on navigating the New York's newest set of cybersecurity regulations to help firms adopt a security strategy that scales in the face of future cybersecurity requirements. Read More ▶ |
|
There is growing concern about how third-party IT services providers are protecting corporate data. Here are six ways IT leaders can better negotiate cybersecurity and data privacy issues. Read More ▶ |
|
Corporate espionage is the domain of companies that steal information to gain competitive advantage. Here's how to take the target off your back. Read More ▶ |
|
|
An Internet of Things (IoT) device using voice recognition requires the collection and interpretation of sounds. These sounds may extend far beyond the voice commands being given and cannot avoid being captured. How sound is captured and processed may lead users to believe an organization is either respectful or a voyeur. Read More ▶ |
|
Researchers have found a new attack technique in the wild that allows a single laptop to take down high-bandwidth enterprise firewalls. Read More ▶ |
|
Hotel and restaurant chains, beware. A notorious cybercriminal gang is tricking businesses into installing malware by calling their customer services representatives and convincing them to open malicious email attachments. Read More ▶ |
|
DDoS attacks are vastly bigger now, thanks to botnets composed of Internet of Things devices. A recent attack that took down a portion of the internet has led to questions about whether something similar could shut down critical infrastructure. Read More ▶ |
|
Cyber security analysts are overwhelmed with the pressure of keeping their companies safe. Here’s what you need to consider when adopting an automated investigation environment. Read More ▶ |
|
The U.S. government needs to pass regulations mandating internet of things security measures before device vulnerabilities start killing people, one security expert told lawmakers. Read More ▶ |
|
Video/Webcast: Veracode We've seen a dramatic rise in attacks on the application layer. Often left unguarded, this layer has become a prime gateway for attacks. Avoid the brand and financial damage these attacks cause. Protect your company's brand - watch this video highlighting why application security matters! Read More ▶ |
When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success. ▶ |
Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that. ▶ |
This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here. ▶ |