Phil Schacter, managing VP, Gartner recently guest-hosted a Tufin webinar which talked about how complexity and change are affecting enterprises far more today than ever before.
In a new blog post from Rohyt Belani, CEO of PhishMe, the issue of security compliance and training discussed. The following Key points include
Looking for an iWatch? Try the new Nike Fuelband. How about an Apple phablet? Leave that to Nokia. Whither the Apple-branded HDTV set? You may have to wait for the 4K revolution.
Yahoo, in its crusade to reinvent itself, is adding another item to the agenda: revamping its small-business web hosting unit.
When we talk about who our mentors are, many assign the role to that of a former teacher, an omnipresent icon, a past or present boss, or some other who played a significant role in our personal and professional development.
Social engineering has for a while now been cyber attackers’ best bet to enter systems and compromise accounts when actual hacking doesn’t work, or when they simply don’t want to waste much time getting in.
Earlier this month, we reported on the arrest and indictment of a Washington state couple that had been selling on The Silk Road, the infamous Tor-enabled online market.
Google has pulled multiple Android apps that relied on a popular mobile app library that posed a severe security risk.
It’s a bad day for the vulnerability scanning industry: DARPA has announced a new multi-million-dollar competition to build a system that will be able to automatically analyze code, find its weak spots, and patch them against attack.
Commenting on the news that Google has added a DDoS service, Jag Bains CTO of DDoS protection company DOSarrest Internet Security has commented: