Security

Why Email Security is Your Next Big Opportunity (IT Pro)

News headlines frequently tout the proliferation of email-based spam and malware. In 2014, two-thirds of all email traffic was spam. For mid-sized businesses, spam and viruses have... More

SAS Founder Jim Goodnight Doesn’t Buy the AI Hype But Has High Hopes for Analytics at the Edge (ComputerWorldUK)

SAS Institute CEO and co-founder Dr Jim Goodnight has played a central role in the rise of data analytics in his 41 years at the helm of the software giant, but he doesn't buy the ... More

NSS Labs Conducts First Cross-Platform Test of Leading Web Browsers (CDSA)

NSS Labs today announced the release of its Web Browser Security Comparative Reports. The reports reveal how effective web browsers are at protecting users from socially engineered... More

KRACK Attack: Here’s How Companies are Responding (CNET)

A serious Wi-Fi security flaw was revealed Monday, and it puts everything from your phone to your smart refrigerator at risk. An exploit called KRACK, short for Key Reinstallation ... More

10 Steps for Writing a Secure Mobile App (Dark Reading)

More than 4 million mobile apps are currently in production, but only 29% on average are tested for bugs, and nearly a third of these contain significant vulnerabilities, according... More

Here’s How to Rethink the Role of Robots in Our Lives (Tech Wire Asia)

Mark Hearn, Director of IoT, Irdeto: "Organizations today know that they need to have a cybersecurity strategy in place to protect their intellectual property and sensitive data fr... More

10 Critical Security Skills Every IT Team Needs (CIO)

2. Security analysis - Tools are important, but it’s also critical to understand how they fit into your overall security strategy, says Stanger. “Before you can figure out whic... More

NSS Labs Initiates Group Test Analysis Coverage of SD-WAN Market, Call for Industry Input (HITS)

NSS Labs announced that it is expanding on its strong core foundation of point-in-time test validation and continuous security validation with the introduction of the Software-Defi... More

3 Tips for Making Better Investments in Security (InformationWeek)

The kids are back in school, the leaves are changing color, and the days are growing shorter – all signs it’s time for IT leaders to start thinking seriously about next year’... More

Identifying ‘Key Indicators of Compromise’ Crucial to Data Breach Detection (IT Pro Portal)

Traditional cybersecurity protection, like anti-virus tools, perimeter defences or firewalls, are virtually powerless to defend against today’s tech-savvy cybercriminals, who now... More

How Netflix Hacks: Behind the Scenes at the Streaming Giant’s Hack Day (Variety)

“Ladies and gentlemen, boys, and girls, children of all ages!” yelled Netflix senior software engineer Alex Wolfe from the stage in front of about 300 of his colleagues on a re... More

How to Set Up Identity Access Management for a BYOD Workplace (Okta Blog)

n the United States, 35% of employees are now contractors or freelancers. And according to the U.S. Bureau of Labor Statistics, the average length of time a person stays at one com... More

Cisco Rolls Out Industry-First Security Features for Spark (ZDNet)

Cisco on Monday is unveiling a set of new security features for its Spark platform that it says are unprecedented in the cloud collaboration space. The new capabilities, years i... More

How Google is Speeding Up the Internet (IT World)

Engineers at Google have developed a new algorithm to speed up TCP, the main transport protocol for traffic on the internet, by optimizing the speed at which traffic is sent so it ... More

Slack Moves to Integrate with EMM for Enterprise Security (Computerworld)

Slack has enabled integration with more than a dozen enterprise mobility management (EMM) platforms in order to offer security and policy management features to its four-year old, ... More

Irdeto Report: Majority of Consumers Believe IoT Needs Security Built In (Dark Reading)

While 90% of consumers across six different countries expect security to be built into their Internet of Things devices, the question about who should be responsible for implementi... More

Five Reasons Why Business, IT Leaders Should be Looking at Dynamic Cybersecurity (HCL Blog)

While cybersecurity has consistently been ranked as a top investment priority for enterprises, one can argue that it has never been more critical for ensuring business success, tha... More

Kroll Names Pierson Clair Senior Director in Cyber Security and Investigations Practice, Los Angeles (CDSA)

Kroll announced the appointment of Pierson Clair as a Senior Director in Kroll’s Cyber Security and Investigations practice. He is based in Kroll’s Los Angeles office. “P... More

CIOs Should Step Into the IoT Oversight Void (CIO)

If you think your organization is taking oversight of third-party IoT implementations seriously, think again. According to a recent study, few organizational boards require IoT ris... More

IBM Opens European X-Force Command Center in Poland (HITS)

IBM Security today announced the official opening of its modernized European IBM X-Force Command Center based in Poland. The center has new cognitive capabilities, including IBM Wa... More