IT security

Validate Your IT Security Expertise with the New AWS Certified Security – Specialty Beta Exam | Amazon Web Services

If you are an experienced cloud security professional, you can demonstrate and validate your expertise with the new AWS Certified Security – …

Cloud Computing

How to Talk to Management About Cybersecurity and Risk

As an IT professional, you’ve developed some ideas on how cyber attackers might compromise your enterprise data, and how you can defend against them. …

Cybersecurity

No More Ransom: a clearinghouse for removing ransomware without paying

No More Ransom is a joint effort by Europol, the Dutch police, Kaspersky and McAfee to help people who've been compromised by ransomware get their …

Cory Doctorow

Top 10 IT security stories of 2017

Although WannaCry dominated the cyber crime landscape in 2017, the attack was not without significance for anyone responsible for IT security within …

Cybersecurity

A Good Resource

Internet security is complicated and there are lots of dependencies – usually if you ask an internet security practitioner “is ${<i>this thing</i>} safe?” …

Security

Should Doctors Offer Concierge IT Security Services?

Posted on December 20, 2017 I Written By <b>Anne Zieger</b><p>Anne Zieger is veteran healthcare consultant and analyst with 20 years of industry experience. …

Health Care

Nearly 84 percent device manufacturers are embracing software as core business model

With the device <b>manufacturing industry</b> embracing software over hardware as its primary business model, a new report on 15 December said that 84 …

Internet of Things

8 Steps for Building an IT Security Career Path Program

A cybersecurity career-path program can help with talent retention and recruitment.<p>1 of 9<p><i>Image Source: Pixelbliss via Shutterstock</i><p>Cybersecurity …

APAC firms confident of security measures despite breaches: Fortinet

48 percent of IT decision makers at APAC organisations are confident of their security measures, despite 86 percent of those organisations having …

Cybersecurity

8 Steps for Building an IT Security Career Path Program

A cybersecurity career-path program can help with talent retention and recruitment.<p>1 of 9<p>Looks like you've hit your article limit. Please or register …

Information Security

Beyond Perimeter Security: Why to Apply a "Tower Defense" Strategy to IT Security

Most MSPs aim to prevent IT security breaches. Today, however, it is time to admit that plugging every hole is just not realistic. The bad guys will …

Cybersecurity

PR Distribution

<b>Bio-Based Resins Market</b> report delivers information about <b>vendors, geographical regions, annual growth rate, market share, revenue</b> and the actual …

Cybersecurity

IDG Contributor Network: Department of Defense contractors must implement IT security controls by December 31

The United States Department of Defense (DOD) buys over $270 billion worth of products and services from commercial organizations in support of its …

Cybersecurity

SaaS-based IT Security Market Player 2017 – IBM, Intel Security, Symantec, Alert Logic and Others

<b>ReportsWeb.com added “SaaS-based IT Security Market – Global Trends, 2017 Analysis and 2025 Forecasts” report to its research database.</b> <b>This Report is</b> …

Cybersecurity

Audit blasts city's IT security

Auditor general also also found holes in child-care subsidies, Lansdowne contract<p>Ottawa's auditor general delivered a number of worrying audits …

Child Care

Specialist Aussie IT pros are earning more than ever

Wages for Australian IT professionals have grown above average in the last five years due to high demand for specialist skills.<p>Data from the 2016 …

Social Justice

SaaS-based IT Security Market to Expand Substantially Owing to Technological Innovations During 2017-2025

Security as a Service is a computing model that is based on software as a service model which provides security services over the internet. It …

Cybersecurity

What Is Vulnerability Management?

Enterprise networks regularly see change in their devices, software installations and file content. These modifications can create risk for the …

Information Security

New EU GDPR: An IT Security View - Part II

The GDPR requires that data controllers/owners implement DPIA where certain kinds of processing of PII may are likely to increase the risk to the …

Cybersecurity

Emerging IT Security Technologies: 13 Categories, 26 Vendors

A rundown of some of the hottest security product areas, and vendors helping to shape them.<p>1 of 14<p>Looks like you've hit your article limit. Please or …

Vietnamese IT security company claims to beat iPhone X’s Face ID using $150 mask

Vietnamese cybersecurity company Bkav has allegedly found a way to trick Face ID on Apple’s iPhone X.<p>The company released a YouTube video on November …

Face ID

Developing a Security Outsourcing Strategy That Really Works

Wednesday | 8:00am<p>Wednesday, November 29 | 8:00am - 9:00am<p>Breakfast<p>Wednesday, 8:00am - 9:00am<p><b>Location:</b> Business Hall<p><b>Session Type</b>: General …

Texas A&M

Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches

Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.<p>Organizations with …

Cybersecurity

New study: SaaS-based IT Security Market Trends, Business Strategies and Opportunities 2025

Security as a Service is a computing model that is based on software as a service model which provides security services over the internet. It …

Cybersecurity

Extortion-based cyber attacks: The next evolution in profit-motivated attack strategies

Today, data breaches have impacted just about every industry possible. From entertainment to the restaurant industry, no sector or organization …

Cybersecurity

SA's cyber security concerns mirror global trends

The IT security concerns, challenges and investment by South African enterprises are closely aligned with those of their international …

Cybersecurity

The IoT Blindspot

Confusion over whether IT staff or line of business professions are responsible for IoT management and security plays big role in a lack of …

Cybersecurity

Businesses switch to Gmail for ransomware and spear-phishing protection

IT security teams at Fortune 500, Global 2000 and mid-sized corporations spend way too much time combating spear-phishing and ransomware …

Cybersecurity

Minnesota Names IT Security Director to Interim State CISO Post

Call, pictured at left, has been the director of information security for MNIT since September 2014 according to his LinkedIn profile, managing the …

Cybersecurity

1 in 5 IT security pros still use paper to track accounts and passwords

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. …

Cybersecurity