CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. Read More ▶ |
|
| Video/Webcast: OpenText Watch the webinar for tips on dealing with new-era content. Read More ▶ | IT security professionals are in high demand in most job markets, but some metropolitan areas are better than others when it comes to offering a top pay check. Randstat recently released its annual IT salary study, which looked at the top 45 highest paying markets in 27 states. Following are the top 20 markets for cyber security engineers, based on the medium salary reported. Read More ▶ |
| This desk lamp features a sleek and minimalistic design with no buttons thanks to its creative touch sensitive panel, for control over multiple brightness and color temperature settings. Also features a USB port equipped with the iSmart technology for safer and faster charging. Read More ▶ |
| On Jan. 6, Donald Trump said his administration would produce a report on cybersecurity within 90 days after his inaguration. On Wednesday, President Trump marks his 90th day in office with no sign of a report or indication that one is on the way. Read More ▶ |
| | Cybercriminals can engage in more ransomware attacks, thanks to a new variant called Karmen that hackers can buy on the black market for $175. Read More ▶ |
| Safe drinking water is a necessity for protecting public health and safety. Water systems in the United States perpetuate all human activity and properly treated wastewater is vital for preventing disease and protecting the environment. The security and protection of drinking water, wastewater treatment services, and collection systems are essential to the American way of life and the nation’s economy. Read More ▶ |
| The so-called Playpen cases – which arose from the FBI running a child porn website as a sting operation – has prompted an intense debate over the Fourth Amendment’s protections from “unreasonable” search and seizure. Read More ▶ |
| Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks. Read More ▶ |
| White Paper: OpenText Read the 2017 report for info management transformation tips. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|