But the response to the new hacking tool, now readily available to the masses of script kiddies, has been a mix of outrage, fear, some applause, and more than a few shrugs.
Join Darran Rolls, the CTO & CISO of SailPoint, the leader in the Gartner Magic Quadrant for Identity Governance and Administration, as he demonstrates how to build an identity-aware infrastructure.
However noble the intention, obtaining unauthorized access to devices and making them unusable is illegal and undermines the work of ethical researchers.
Contrary to popular opinion, there is no one single cloud. There are a wealth of cloud-based providers that own dedicated server space across the globe. Here's how to find the best fit for your company.
This past season, the authors of a traditional banking Trojan focused on what people do between Thanksgiving and New Year's Day: shop, eat, check their bank account, and entertain.
The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The ...
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.