|
White Paper: NetSupport Inc NetSupport DNA is an ITAM suite− with a twist. It also includes a range of tools designed to work as part of an organisation's broader desktop and network security planning. Read More ▶ |
The Internet Society's Mutually Agreed Norms for Routing Security (MANRS) initiative is designed to provide measures to improve the resilience and security of the internet's routing infrastructure to keep it safe for businesses and consumers. Read More ▶ |
|
Underground markets offer a great variety of services for cyber criminals to profit from. These forums offer items ranging from physical world items like drugs and weapons to digital world items such as spam/phishing delivery, exploit kit services, "Crypters", "Binders", custom malware development, zero-day exploits, and bulletproof hosting. Read More ▶ |
|
A backdoor in Android firmware provided by manufacturer Foxconn allows attackers to root devices to which they have physical access, according to a security researcher and BBQ enthusiast who dubbed the vulnerability Pork Explosion. Read More ▶ |
|
|
Congress has finally issued a report on the breach of the federal Office of Personnel Management that exposed the personal information of more than 22 million current and former employees. It comes 15 months after the breach was made public. Read More ▶ |
|
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Scott Schneider from CyberGRX, a startup in the third-party risk analysis space, about best practices and tips for CSOs when working on a risk analysis plan with third party vendors. Watch Now ▶ |
|
Small and medium sized businesses have embraced BYOD faster than large corporations, but research suggests SMBs aren't taking security seriously. Here are five affordable and easy-to-deploy BYOD management solutions that will get your data secure, without hurting productivity. Read More ▶ |
|
Almost 6,000 online shops have been compromised by hackers who added specially crafted code that intercepts and steals payment card details. Read More ▶ |
|
Since Sept. 11, 2001, the airline industry has been one of the fastest industries to upgrade their security procedures and protocols against various threats, both present and perceived. However, hackers don't need to board an airplane to gain control of the systems set in place to control it. Read More ▶ |
|
Several studies have come out recently trying to get a handle on the total costs of a data breach, with a large variation in costs - from less than $1 million on average, to $6 million - based on the data sets and types of included costs. But the actual numbers could be several times higher. Read More ▶ |
|
White Paper: NetSupport Inc NetSupport DNA is an ITAM suite− with a twist. It also includes a range of tools designed to work as part of an organisation's broader desktop and network security planning. Read More ▶ |
What projects are CIOs prioritizing in the year ahead? Where are they spending those precious IT dollars? These are the questions that will be answered (with your help!) in our 16th annual State of the CIO survey. Make your voice heard! ▶ |
Historically, hardware upgrades on Windows PCs that involved major changes (new motherboard and/or CPU, for example) required a phone call to Microsoft to reactivate the Windows license. Microsoft has altered its licensing policy to cut down on calls. Here’s what happened when we tested this hypothesis. ▶ |
Cloud-based ERP will eventually rule, and on-premises software is destined for legacy status. How can IT ensure a smooth transition? ▶ |