Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted Read More ▶ |
|
| White Paper: Workday In terms of security, IT's best move is the one that many CIOs hesitate to make. CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Read this whitepaper to learn how cloud computing can help IT executives meet these conflicting objectives. Read More ▶ | Get out the mop. Your vendor has been breached and your constituents are at risk. That’s what 10 states are doing right now as they clean up after America’s JobLink Alliance Technical Support informed the states of Kansas, Alabama, Arizona, Arkansas, Delaware, Idaho, Illinois, Maine, Oklahoma, and Vermont of the loss of personal identifiable information (PII) of their job seekers to an unknown malicious third party. The who, what, where, why and how of the AJLA-TS data breach affecting job seekers across ten US states. Read More ▶ |
| Put Alexa in 3 rooms for less than the price of one Echo. Echo Dot is a hands-free, voice-controlled device that uses Alexa to play music, control smart home devices, provide information, read the news, set alarms, read audiobooks from Audible, and more. Amazon has quietly published a special code that will apply a $20 discount when you buy 3. Read More ▶ |
| There are many more openings for security systems administrators than qualified applicants. That creates opportunities for IT professionals willing to get the training and certification. Read More ▶ |
| | Peter Cohan shares insights from his career and latest book to explain the importance of security in the boardroom and what boards and security leaders need to advance their relationship Read More ▶ |
| An expert at Brown University provides a counterpoint to an earlier story on why you don't need to study security in college. Read More ▶ |
| If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence. Read More ▶ |
| White Paper: Safebreach An invaluable technique for understanding security risks is to assess your environment. But, vulnerability assessments provide limited context, while penetration testing's point-in-time approach renders findings that are quickly out-of-date. A better approach is dynamic security assessment, as defined by Securosis analyst Mike Rothman. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|