iOS app Android app

It Security

Is Compliance Distracting From Security

Richard La Bella | Posted 05.04.2014 | Technology
Richard La Bella

Compliance has become a checklist that doesn't align quite right with the dark underground of highly motivated, skilled attackers. That's where security comes in - something security practitioners should be doing more of.

Email Follies Plague Corporate America

Daniel Garrie | Posted 04.08.2014 | Technology
Daniel Garrie

It is beyond refute that for every email sent, there's an excellent chance that someone, or many persons, may have kept a copy.

Designing Degrees for Digital Gatekeepers

Edward Guiliano, Ph.D. | Posted 01.25.2014 | College
Edward Guiliano, Ph.D.

In this environment, enter universities that are designing degrees, creating knowledge, framing debates, and developing solutions about pressing issues (before, during, and after they become problems). Take cyber security.

Gerry Smith

NSA Chief: Solution To Stopping The Next Snowden Is Replacing His Former Job With A Machine

HuffingtonPost.com | Gerry Smith | Posted 08.09.2013 | Technology

NEW YORK -- The director of the National Security Agency said Thursday that the agency has found a way to prevent further leaks about American surveil...

WordPress Hackers Serve Up Cautionary Tale to Small Businesses

Mike Foreman | Posted 06.29.2013 | Technology
Mike Foreman

Once again we come back to the very real threat this kind of malware presents to the small- to medium-sized business who will very commonly use these kinds of free and open source tools to build up and maintain their online presence.

Do You Have a Cyber Intelligence Plan?

Richard La Bella | Posted 06.09.2013 | Technology
Richard La Bella

The threat landscape has changed from noisy, messy worm attacks to stealthy, sophisticated, state-funded attacks, with major organizations such as Google, Microsoft, Apple, The New York Times and our government as victims.

Bring Your Own Device Schemes Should Set Alarm Bells Ringing

Norman Shaw | Posted 09.13.2012 | Business
Norman Shaw

With employees increasingly shuttling their hardware between home and office, businesses need to be sharper at ensuring they're covering the accompanying security risks.

Risky Business

Ian Beale | Posted 05.08.2012 | Business
Ian Beale

The very real consequences of failing to keep up with the changing world include security breaches, reputation damage, regulatory fines, and even falling foul of the law.

Cloud Computing: Visibility, Control And Automation For Your Data Center

Posted 04.29.2012 | Technology

IBM's Integrated Service Management solutions offers workload optimized systems, data center optimization, improved service delivery and easier risk m...

IT Security Acquisitions Are Skyrocketing

Robert R. Ackerman, Jr. | Posted 05.25.2011 | Business
Robert R. Ackerman, Jr.

For all the talk about a chronic shortage of exits for venture-backed companies, one segment of the venture capital technology ecosystem is poised to go from "hot" to "hotter": Cyber-security.

Employee Theft: 5 Things You Need To Know

The Huffington Post/AOL Small Business | Charlotte Jensen | Posted 08.09.2011 | Small Business

If you're not worried about the potential for employee theft and fraud in your small business, perhaps you should be. According to a 2008 report by th...