Physical safety isn't the only thing that travelers need to worry about at the Rio Olympics -- security experts warn that travelers need to be extremely careful when they access computer networks, as well. Read More ▶ |
|
| White Paper: Thycotic Software Co-sponsored by Thycotic and Cybersecurity Ventures, the 2016 State of PAM Report presents the results & findings of a survey of over 550 organizations. Read More ▶ | If you're looking for a good lesson in enterprise security, there might be a few sitting in the parking lot. The automotive field is a glaring example of "worst practices" in security, say several automotive experts. And, the problem is only getting worse, not better. Read More ▶ |
| The professed goal of audio surveillance on mass transit systems may be to protect passengers. But privacy advocates say it crosses a line, amounting to violations of free speech and the right to be free from unwarranted and ‘unreasonable’ searches. Read More ▶ |
| The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection. Here are capsule reviews of 10 advanced endpoint protection products: Read More ▶ |
| | David Richardson, director of product at Lookout, walks us through this all-too-common attack. Read More ▶ |
| IT executives and disaster recovery experts share their advice on how businesses can create an effective DR plan. Read More ▶ |
| An appeals court has ruled that a former employee of a company, whose computer access credentials were revoked, had acted “without authorization” in violation of the Computer Fraud and Abuse Act, when he and other former employees used the login credentials of a current employee to gain access to data on the employer’s computers. Read More ▶ |
| An IDG Enterprise study of big-data initiatives finds that the extremely valuable output of those projects often lacks additional security. Download the free report. Read More ▶ |
| eBook: Palerra Cloud security is a shared responsibility between the organization and the provider. Organizations face a number of challenges in securing their AWS instance, including detection of anomalous activity, monitoring security configurations, and incident remediation. Unfortunately, many organizations lack sufficient cloud security measures to adequately address their end of the Shared Responsibility Model. Read More ▶ | The Windows 10 Start menu is a blend of navigation from Windows Phone and Windows 7, and it's highly customizable. We’ll walk you through it. ▶ | By 2020, reports estimate that there will 700,000 new project management jobs in the United States. Do you have what employers will be looking for? ▶ |
|
|
|