The information security industry is in desperate need of skilled personnel. But, as CSO investigates, some of those professionals could potentially be sourced from other industries. Read More ▶ |
|
| White Paper: DOUBLE-TAKE Today's IT world is exploding with volumes of data and pressure to fulfill corporate expectations of near-continuous uptime. In this 8th Annual State of Resilience Report, Vision Solutions reviews how IT professionals around the globe evaluate their business environment, determine the best tools and ensure system-wide resilience. A review of our 2015 research will give you statistics, trends and insight into the state of IT systems world-wide. Read More ▶ | For the next two years, “good-faith” security researchers will be allowed to hack into the software of most Internet of Things devices without risk of violating copyright laws. Whether that will lead to more cooperation or confrontation remains to be seen. Read More ▶ |
| If you're into Steam Gaming, or know somebody who is, you should consider these deals currently active on Steam gear. Read More ▶ |
| After a zero-day exploit to the maritime transportation sector, DHS's National Cybersecurity and Communications Integration Center notified potentially-affected U.S. ports about the threat. They described the apparent vulnerability and provided preliminary mitigation measures. Read More ▶ |
| | We have more data than we need and we actually need far less than we think. We could begin by simply making better bets, says Richard Seiersen. It's time to awaken the statistical ninja inside our security teams. Read More ▶ |
| Focusing on the most critical systems first, the agency responsible for MUNI says IT teams are in the middle of their BCDR process this morning. The IT staff jumped into action after a ransomware attack forced some systems offline during the Thanksgiving holiday weekend. The agency also says that claims of data exfiltration by the attacker are false. Read More ▶ |
| Unless Congress takes 11th-hour action, the FBI and other law enforcement agencies will gain new authority this week to hack into remote computers during criminal investigations. Read More ▶ |
| It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to take your money and personal information. Here are a six holiday threats to watch out for. Read More ▶ |
| Research/Infographic: A10 Networks The Internet of Things (IoT) will enable all types of devices to connect, increasing bandwidth demands. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|