|
White Paper: J2 Global Communications Analysis of the Department of Health and Human Services data suggests that in 2016, the healthcare industry has suffered four data breaches per week so far, while the private research firm IDC has estimated that one in three healthcare patients can expect to have their medical records and other ePHI breached by cybercriminals in 2016. Read More ▶ |
The information security industry is in desperate need of skilled personnel. But, as CSO investigates, some of those professionals could potentially be sourced from other industries. Read More ▶ |
|
A judge in Wisconsin has refused to order a recount by hand of ballots cast in the state for the U.S. presidential elections, shooting down a petition by Green Party candidate Jill Stein that the use of automatic tabulating equipment, identified as potential targets of foreign government agents, “risks tainting the recount process.” Read More ▶ |
|
Internet companies should not be required to monitor third-party terrorist content that they host or transmit, nor should they face direct or indirect liability from governments for such content, according to a new study. Read More ▶ |
|
|
If you thought 2016 was bad, fasten your seat belts -- next year is going to be even worse. Read More ▶ |
|
Most cybercriminals make between $1,000 and $3,000 a month, but 20 percent earn $20,000 a month or more, according to a recent report from Recorded Future Read More ▶ |
|
Traditional security information and event management systems are expensive, require dedicated security staff, and are difficult to set up and manage -- but managed security service providers are stepping in to make SIEMs practical for smaller firms Read More ▶ |
|
What we can do to keep all those clever devices from causing harm. Read More ▶ |
|
Three senators' efforts to stop a major expansion of U.S. law enforcement agencies' hacking powers has failed for now. Read More ▶ |
|
White Paper: Absolute Enterprise IT teams face an uphill struggle to maintain visibility into and control over corporate resources and mitigate risks to critical business assets. This Technology Spotlight explains why a modern endpoint security strategy requires an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Read More ▶ |
When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success. ▶ |
Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that. ▶ |
This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here. ▶ |