This past weekend at SXSW, two Congressmen suggested that the U.S. create a cybersecurity reserves system, similar to the National Guard, but the idea has received a mixed welcome from the cybersecurity community Read More ▶ |
|
| White Paper: IBM Corporation Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. Read More ▶ | Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored. Read More ▶ |
| The Cyborg 168T bicycle rear light charges from your computer or any device with a USB port. Only takes 2 hours to fully charge and features 50 micro-LED chips that emit up to 168 Lumens. Read More ▶ |
| It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany. Read More ▶ |
| | With recent increases in bug bounty amounts in the news, Bugcrowd shows how a bug bounty amount is calculated. Read More ▶ |
| The biennial (ISC)2 report shows that the percentage of women in cybersecurity remains unchanged. Given the significant shortfall of security talent, what can we learn from this report about how to fix our weak and leaky pipeline? Read More ▶ |
| Levi Gundert, vice president of intelligence and strategy at Recorded Future, will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not. Read More ▶ |
| White Paper: Kaspersky Lab Inc When a business is hit by cryptomalware, data is encrypted into an unreadable form until a ransom is paid to cybercriminals. No wonder 42% of SMBs consider this to be one of their most security threats. Download this whitepaper to learn how you can protect your business from this dangerous scenario. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|