Spectre and Meltdown are the names given to a trio of variations on a vulnerability that affects nearly every computer chip manufactured in the last 20 years. The flaws are so fundamental and widespread that security researchers are calling them catastrophic. Read More ▶ |
|
| White Paper: Software AG Inc Enterprise architecture and technology innovation leaders face unprecedented change and will likely require an EA tool to enable them to manage complexity more effectively. This research informs them of the main EA tool vendors in an evolving marketplace driven by the dynamics of digital business. Read More ▶ | The vulnerability assessment platform is one of the most realistic tools, but also one of the most dangerous, that CSO has ever reviewed. All of the attacks that it can load or create are real, using actual techniques and tactics that have historically broken through cybersecurity defenses at many organizations. Read More ▶ |
| H&R Block's software will guide you through your unique tax situation to make sure everything is accounted for. This version handles both Federal and State returns and is currently discounted 33% with a potential 5% Amazon cash bonus. Read More ▶ |
| Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure. Read More ▶ |
| | How to deal with the safe guess that your company has been breached. Read More ▶ |
| One problem is that tech companies still try to force-fit their commercial applications into the federal space. But that's not the only issue... Read More ▶ |
| Yes, it's possible to do a Microsoft Exchange Server deployment that is secure enough for all but the most sensitive information. Here's how to do it. Read More ▶ |
| White Paper: Neustar Inc Getting bogged down fighting attacks on a daily basis means teams are forced to improvise and react to threats, a temporary tactic that is not a substitute for a long-term strategy. In an era where a growing number of digital devices are accessing network data from an array of entry points, organizations need a forward- thinking security approach that aligns with their broader business goals. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|