Security | News, how-tos, features, reviews, and videos
One in four of organizations report greater monetary losses.
Southeast Asia is no stranger to data breaches. Here are eight password management solutions to help keep your enterprise secure.
As cyber-attacks grow in frequency, chief information security officers and C-suite executives must work more closely together.
The plan to create a government-run identifier raises intellectual property concerns and duplicates private sector efforts.
This Cybersecurity Awareness Month, we’re reminded that today’s cybersecurity landscape is rapidly evolving and advanced, proactive, and comprehensive security technology is not optional but essential.
Contractor hiring is on the rise. Discover the hottest skills for tech contractors and why employers are sourcing these skills from the independent workforce.
Defense Department tech chiefs working to modernize sprawling IT infrastructure encounter similar hurdles u2014 if on a larger scale u2014 as CIOs in other agencies and the private sector.
Without knowing what privacy risks are, businesses and consumers would be left in the dark under new privacy law proposals.
Are CIOs supposed to avoid risk or embrace it? It depends. For digital programs to flourish and fuel the growth of the larger organization, entirely new behaviors need to be adopted by IT leadersu2014but they each come with an assumed risk.
A sound governance, risk and compliance (GRC) strategy is more valuable u2014 and harder to hone u2014 than you might think. Hereu2019s how to avoid looming disaster.
Letu2019s be careful not to shortchange the free flow of public data in the rush to pass new privacy.
Sponsored Links