|
White Paper: Dell - Quest Software Security is a moving target. To play it safe, you err on the side of a static approach but users complain that it's restrictive. If your security could adapt to the context of user access, then you could provide the access they need without worrying about stolen user credentials. Read More ▶ |
CSO explores the deep web, dwell time, and their roles in the balance of power in cybersecurity, pointing up defensive moves such as employing hackers and improving the effectiveness of employee education about social engineering / phishing in order to better arm personnel. Read More ▶ |
|
With the network perimeter wide open, see what chief security officers can do to keep everything secure? Read More ▶ |
|
Poorly managed firewall rules can lead to security disasters. Here, security managers in the IT Central Station community review the top firewall management suites: Tufin, AlgoSec, FireMon and RedSeal. Read More ▶ |
|
|
A new strategy for training bug-finding tools could help catch more vulnerabilities. Read More ▶ |
|
A data breach that hit Wendy's fast food restaurants targeted customer credit card information and was more than three times bigger than originally disclosed. Read More ▶ |
|
Cyber insurance may be a booming business thanks to the high-profile breaches, but the market for such policies is a complicated, say experts from SANS Institute, Advisen and PivotPoint. Read More ▶ |
|
Today's popular bug finders catch only about two percent of the vulnerabilities lurking in software code, researchers have found, despite the millions of dollars companies spend on them each year. Read More ▶ |
|
The new documentary about Stuxnet, ‘Zero Days’, says the U.S. had a far larger cyber operation against Iran called Nitro Zeus that has compromised the country’s infrastructure and could be used as a weapon in any future war. Read More ▶ |
|
The war against the cyber criminals won’t be won alone. To keep the hackers at bay, more security vendors have been trying to foster cooperation, and share data on the latest threats – even as it might spark concerns over trust and competition. Read More ▶ |
|
White Paper: Trend Micro Incorporated Effectively thwarting modern malware and targeted attacks requires a new level of integration and coordination among traditional domain-level controls and next-generation, centralized security analysis, correlation, and management systems. Read More ▶ |
The annual awards honor 100 organizations that deliver innovation and business value from IT. This year’s winners are serious about winning customers and driving revenue. ▶ |
MOOCs -- free Massive Open Online Courses -- can bring agility and efficiency to enterprise IT training and skills development. Here's how to choose wisely. ▶ |