Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a new report. Read More ▶ |
|
| White Paper: Trend Micro Incorporated By now, not only security professionals, but also many knowledge workers and consumers are well aware of the insidious nature of ransomware. As its name implies, ransomware is malicious software that holds data files hostage pending the payment of a ransom, typically with untraceable bitcoin as the currency of choice. Read More ▶ | Government agencies, law enforcement, security experts, and businesses joined IBM Security as they opened the industry's first commercial Cyber Range at their new global headquarters in Cambridge, Mass., today. Read More ▶ |
| Whether you work for an organization controlled by compliance standards or you are an independent IT firm looking to build your enterprise business, understanding industry regulations is crucial as it pertains to cybersecurity. Michael Hall, CISO, DriveSavers, provides a few best practices for businesses operating in or with regulated industries. Read More ▶ |
| | | Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market, and some security experts are questioning the ethics and benefits of this approach. Read More ▶ |
| Video/Webcast: Anomali Threat intelligence and threat intelligence platforms have become must-haves for large organizations. From large enterprises to government agencies, it is important to understand what threat actors are doing, review threat intelligence and collect indicators of compromise. However, threat intelligence itself has become a big data problem and the number of active indicators of compromise has grown into the tens of millions. Read More ▶ | When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success. ▶ | Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that. ▶ | This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here. ▶ |
|
|
|