|
Webcast: CA Technologies Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More ▶ |
Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access. Read More ▶ |
|
Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns. Read More ▶ |
|
Amid widespread hacking purportedly sanctioned by the Russian government, FBI Director Comey confirms active investigation into potential coordination between Trump campaign and foreign operatives, while shooting down allegations that Obama had Trump Tower wiretapped. Read More ▶ |
|
|
Future U.S. elections may very well face Russian attempts to interfere with the outcome, the FBI and the National Security Agency warned on Monday. Read More ▶ |
|
Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year. Read More ▶ |
|
It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany. Read More ▶ |
|
The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set now. Read More ▶ |
|
For more than a decade there have been warnings that US critical infrastructure is vulnerable to a cyber “Pearl Harbor” attack. Those overseeing the grid say that is close to impossible, since control systems are not connected to the internet. But other experts say the level of risk, while low, is still unacceptable. Read More ▶ |
|
Research/Infographic: ITS Partners Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More ▶ |
CIO Insider |
Editor's Picks |