Annual IT Salary Survey shines a light on security hiring and compensation trends. Find out what your peers said about their career outlook and how your salary compares. Read More ▶ |
|
| White Paper: Juniper Networks The security market will continue to evolve alongside new requirements arising from the Internet of Things, cloud computing and sophisticated targeted attacks. Read More ▶ | U.S. government agencies have filed more than 70 orders requiring Apple or Google to help law enforcement agencies unlock mobile devices since 2008, despite the agency's insistence that its fight with Apple in a recent terrorism case was limited in scope. Read More ▶ |
| Companies going through a merger or acquisition, as well as their lawyers, financial advisers, and other associated firms are all tempting targets for cyberattackers, according to a new report from Digital Shadows. Read More ▶ |
| Thoughts from Chris Inglis, former Deputy Director of NSA, about whistleblower Edward Snowden’s reasons for leaking classified NSA documents Read More ▶ |
| | MedStar Health said Wednesday it is restoring its computer systems following a cyberattack that reportedly involved file-encrypting malware. Read More ▶ |
| A new custom developed backdoor program has been used over the past year in highly targeted attacks against organizations from Taiwan, Japan, South Korea and the U.S. Read More ▶ |
| Software security for automobiles is improving but it will take another three or four years until car manufacturers can put overarching security architecture in place, says Stefan Savage, the winner of the 2015 ACM-Infosys Foundation Award in the Computing Sciences. Read More ▶ |
| White Paper: Juniper Networks Is your enterprise planning to leverage cloud computing and mobile computing in order to improve business agility, increase employee productivity, and lower capital expenses? Read More ▶ | Editor's Picks |
|
|
|