|
Webcast: CA Technologies Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More ▶ |
Business leaders need to expand their knowledge, and this involves a lot of travel. How can you secure your intellectual properties while on the go? Read More ▶ |
|
If you're like many organizations, your security focus is on protecting email, financial data and customer data. What if your greatest threats come from your vendors and supply chain? Read More ▶ |
|
CSO's Joan Goodchild and Steve Ragan discuss some of the latest security news, including how the FBI director inadvertently (or on purpose?) revealed his Twitter ID and what the new regulations regarding ISPs being able to sell your private data without your consent really entails. Watch Now ▶ |
|
|
Many experts say that people are more important than process in the IT security world. That is politically correct, as opposed to actually correct. Read More ▶ |
|
Considering an enterprise-grade firewall? Download this free report for side-by-side comparisons of rival products from Cisco and Fortinet, based on reviews written by enterprise users of the products. Read More ▶ |
|
President Trump, as part of his plan to roll back regulations put in place by President Obama, just signed legislation, passed by Congress, eliminating the prohibition against ISPs selling customer data without their written consent. This move has ignited a small firestorm of controversy. For businesses and enterprises however, this change is not as bad as it seems. Further, their privacy focus should be on search engines and social networks, which are much better at accumulating data. Read More ▶ |
|
A severe Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage. Read More ▶ |
|
Industrial control systems (ICS) that run the valves and switches in factories may suffer from inherent weaknesses that cropped up only after they were installed and the networks they were attached to became more widely connected. Read More ▶ |
|
Microsoft this week retired the security bulletins that for decades have described each month's slate of vulnerabilities and patches for customers. Read More ▶ |
|
The Travelers insurance company is offering free risk assessment advice from Symantec as a way to help lower their liability and get lower premiums. Read More ▶ |
|
An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops. Read More ▶ |
|
White Paper: Level 3 Communications Today's cyber threats are increasing in volume, diversity and sophistication, rapidly outstripping the ability of point security solutions to safeguard critical data, applications and systems. Read More ▶ |
Magazine | CIO Insider | Editor's Picks |
|