The group of more than 1,400 top elected municipal officials takes the admirable, recommended stance against paying ransoms. However, can towns and cities secure their information technology infrastructure to withstand attacks?
New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices.
With some security best practices, enterprises can significantly reduce the chances that a potential supply chain attack will affect business operations.
In this Dark Reading webinar, a top expert will discuss emerging methods for solving the authentication problem, and for building authentication strategies that go beyond the enterprise premises.
Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response ...
We are seeking your input for an important survey about the role of the IT security or the cybersecurity professional. Participate and get a chance to enter a drawing for 1 of 10 $50 Amazon gift cards.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.