This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
When it comes to privacy, big data analysts have a responsibility to users to be transparent about data collection and usage. Here are ways to allay users' concerns about privacy and big data.
Do you feel confident that everyone in your organization could identify a phishing email that contained ransomware? What if the recipient is in a hurry and under a lot of stress – will they be aware of how sophisticated and authentic-looking a well-crafted whaling attack can be? In today’s post, we share information with the goal that it will help everyone in your organization protect themselves from phishing attacks.
According to a new report from ISACA, 27% of US companies are unable to fill cybersecurity positions, and most applicants aren't qualified for the job. Here's how to better recruit cyber professionals.
IBM's new Watson for Cyber Security, unveiled at RSA, can tap into more than 1 million security documents to help cybersecurity professionals more easily identify and mitigate potential threats.
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
A recent experiment conducted by security company Authentic8 showed how lax some users are regarding their phone data. Here's how to practice good security when you need to charge.
A newly detected malware targeting macOS devices can steal passwords and capture iPhone backups. And it's coming from the same group believed to be responsible for the 2016 election hacks.
A newly detected malware targeting macOS devices can steal passwords and capture iPhone backups. And it's coming from the same group believed to be responsible for the 2016 election hacks.
If you serve up your websites with Apache, you might want to prevent the server from listing subdirectories. Here are two simple tricks for securing your Apache server.
Verizon's latest Data Breach Digest report claims that data breaches are affecting more parts of organizations and becoming more sophisticated. Here's how you can respond.
Researchers at Georgia Tech have created a new form of ransomware specifically to target industrial systems, that disrupted a simulated water treatment plant.
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Ruoting Sun, of Duo Security, reveals how Duo Beyond makes Google-style BeyondCorp trusted web access available to any enterprise, challenging the traditional approach to security.
On Tuesday, the UK's National Cyber Security Centre officially launched, with plans to use the government as 'a guinea pig' for national security measures.
HP Enterprise unveiled a new service at RSA 2017 that can protect data-at-rest, data-in-motion, and data-in-memory. We spoke with HPE about how its greatest value will be in IoT.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
At RSA 2017, we caught up with IBM's Diana Kelley and learned how Watson's security-expert-as-a-service can enhance the work that CISOs and other security professionals are doing.
We interviewed Chris Novak from Verizon's incident response team at RSA 2017 and talked about what the company has learned about securing the Internet of Things.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content