The complexity of today’s SOC functions means you probably can’t hire and keep a staff with all the necessary training.
Security / Opinions
Underwriters Laboratories new Cybersecurity Assurance Program (CAP) looks to certify Internet of Things products. Columnist Rob Enderle writes that these CAP certification will improve IoT security and help CIOs sleep better at night.
Phishing scams aren’t going away, and the scammers are in fact getting more sophisticated. That means users have to be more cautious than ever.
Launchpad is one of the forgotten features in macOS that doesn’t get much attention in the media. Do you still use it on your Mac?
The company calls in our manager to take a look around at a small software company it’s acquiring — after the deal has been signed.
Holiday travel is no time to drop your guard, especially if you take any electronic devices along.
A friend’s company is hit with aggressive ransomware and calls our manager for advice.
Restrictions are abhorrent and a draft bill in the Senate is overly broad and ambiguous. But if Congress insists on restrictions, let's add some critical limits.
There are many reasons not to pay ransom to regain access to your data. Let’s opt for the selfish one.
Sure, cybercriminals are always improving their wares, but nothing has changed about how our machines actually get infected.
Cyberthieves prey on human nature for even more profit.
Hyper-converged solutions can differ vendor to vendor and market to market. Columnist Rob Enderle writes that there are four categories of hyper-converged solutions.
If Kim Kardashian can win a top spot in the App Store, Global 2000 CIOs ought to be held to high bar for delivering compelling digital experiences at scale. Here's a by-the-numbers look at competitive digital strategies.
The company has sanctioned the use of an online password vault, so why is there a spreadsheet making the rounds that contains scores of passwords to servers that contain sensitive data?
Iranian and Chinese governments directed and funded attacks, so why are Iranian and Chinese citizens being charged instead of the governments that directed their actions?
In light of the tragedy in Belgium columnist Rob Enderle writes that it is more important than ever to rethink our security efforts. People seem to think security is someone else’s problem, but the reality is that security is something we all need to own.
Is the government desperate, feigning desperation or just staggeringly inept?
Vulnerability scans uncover on the network unpatched, unprotected PCs that IT never even heard about.
Meeting requirements can be exhausting, but the business payoff can make it all worthwhile.
More and more enterprise organizations are planning and deploying into cloud platforms. This trend is occurring despite organizations historical push-back on cloud services claiming that they are less secure than private on-premises data centers. Even though there is evidence to suggest that cloud application attacks are on the rise, there are best practice methods to secure cloud services. On one hand, internal data center services may be tucked nice and neat behind the corporate perimeter firewall, there is evidence that many enterprises do not secure their systems adequately. On the other hand, even though a cloud serve may be out-of-site and virtualized in a hyperscale multi-tenant data center, patching and solid discipline can make them secure. Now that enterprises have a clearer understanding of cloud services and how to secure them, there are now commonly accepted methods to help make clouds more secure. The appearance of cloud security training and certifications is helping organizations securely consume cloud services.
- NEW Gigamon Transform Security Zone - Find out more now!
- APJ businesses think they will be breached: Here's why: Read the article NOW
- Help us better understand the trends and major practices related to technology use in STEM education. Take this two minute survey NOW.
- F5 Security Hub NEW Look - Try us out today!
- More than 270,000 customers worldwide trust Fortinet to protect their businesses. Learn more.
- CMO's top 10 martech stories for the week - 27 May
- How this marketer got a traditional manufacturing business to embrace digital
- David Jones marketing chief departs; digital executive role created
- Mercer CMO: How B2B brands can achieve customer love
- Pure Storage CMO's tips to make your marketing resonate