Come to the RSA show, and you’ll find plenty of cybersecurity technology. The top vendors from across the industry are here, showing products for fighting ransomware, preventing data breaches and more. Read More ▶ |
|
| Research/Infographic: Citrix Systems Today's always-connected workforce demands instant, secure access to critical business apps, desktops, and data, from anywhere and from any device. Read More ▶ | Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches. Read More ▶ |
| There’s a common perception that men and women make decisions differently. When high-risk decisions are being made, we need both genders in the room because these two approaches balance one another and the resulting decision will be stronger because it incorporates different approaches. Read More ▶ |
| | The skills, education and experience that would garner additional merit have not been discussed publicly, but some cybersecurity leaders and industry-watchers say that special consideration should be given to H-1B visa applicants with cybersecurity skills to help fill critical positions. Read More ▶ |
| To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete visibility into employees’ activities, personal interests and more at the click of a button. Read More ▶ |
| White Paper: Citrix Systems Define the right bring-your-own-device (BYOD), choose-your-own-device (CYOD) and corporate-owned, personally-enabled (COPE) policies for your organization, backed by complete technologies for enterprise mobility management (EMM). Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|