A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them US$150,000. Read More ▶ |
|
| Benchmark Tool: Bitsight Technologies Where is your company on the maturity curve when it comes to building an effective Vendor Risk Management (VRM) program? Take this quick assessment to identify strengths, weaknesses, and opportunities within your current VRM strategy. Read More ▶ | In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding in security companies and where the money is going (and not going), and why CSOs should "follow the money." Watch Now ▶ |
| 3 cutting-edge technologies combine to deliver the fastest possible charge to any device. Charge compatible devices up to 80% in just 35 minutes with Quick Charge 3.0. Patented PowerIQ and VoltageBoost deliver high-speed charging to non-Quick Charge devices. Read More ▶ |
| U.S. lawmakers plan to introduce legislation to limit the FBI's and other law enforcement use of facial recognition technology after concerns about the mass collection of photographs in police databases. Read More ▶ |
| | In 2010, Computerworld looked at five reasons why China will rule in technology. In 2017, the case for China has grown stronger. Read More ▶ |
| Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access. Read More ▶ |
| The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set now. Read More ▶ |
| For more than a decade there have been warnings that US critical infrastructure is vulnerable to a cyber “Pearl Harbor” attack. Those overseeing the grid say that is close to impossible, since control systems are not connected to the internet. But other experts say the level of risk, while low, is still unacceptable. Read More ▶ |
| White Paper: Level 3 Connecting Financial Services' Hybrid IT Infrastructure Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|