The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm Read More ▶ |
|
| White Paper: Akamai Technologies Inc Microsoft's SharePoint Platform is used by tens of thousands of enterprises worldwide to share information with employees and third parties. Many of these users access Sharepoint remotely, which is cumbersome and put the enterprise at risk. Read this paper to learn three reasons why IT needs a new approach to third-party access to Sharepoint. Read More ▶ | Look for U.S. President Donald Trump's administration to push for increased cybersecurity spending in government, but also for increased digital surveillance and encryption workarounds. Read More ▶ |
| Do you like free money? Buy at least $50 worth of stuff on Amazon today, Feb 22, and you'll see a magical $8.62 discount applied at checkout. Amazon is offering this one-day discount to celebrate a 86.27 score they were given on a recent corporate reputation survey. Read More ▶ |
| If your organization is regulated by New York State’s Department of Financial Services (DFS), your organization will need to comply with a new cybersecurity regulation that goes into effect on March 1, 2017. Read More ▶ |
| | Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before U.S. Congress, warning it about the dangers of the internet. Read More ▶ |
| CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read More ▶ |
| If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do. Read More ▶ |
| InfoTrust CEO Dane Meah has called on the Australian government to take advantage of US president Donald Trump’s controversial immigration policy and help local organisations poach cyber security experts from banned countries. Read More ▶ |
| White Paper: Akamai Technologies Inc Most enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago - through VPNs, proxies, and remote desktops - but new and growing realities are forcing enterprises to take a different path. Read this whitepaper to learn five reasons why enterprises need a new access model. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|