What are the top 3 concerns CIOs have in common? Their never ending security concerns, systems availability and services downtime, and acquiring the right human resource capital. according to a recent...
The annual RSA Conference is scheduled to be held between February 27 and March 4 this year. With the rising number of security related threats and attacks in recent times,...
As we move into 2013 organizations are likely to see increased regulatory compliance requirements, growing private and hybrid cloud implementations, software-defined data center consolidation, Bring Your Own Device (BYOD), Big Data,...
By Allan Pratt   In today’s work environment, costs are skyrocketing, but one way to reduce costs is to offer a telecommuting option for employees. While it may be easier for...
Cybersecurity. We now know the numbers. The war on cybercrime continues for most organizations and especially their IT departments and CISOs. The total number of Computer viruses, trojans and web attacks is...
By Nate Lord The amount and variety of malicious programs out there is enough to make your head spin. This blog post will break down the common types of malicious programs...
Neglecting to take proper security measures at the application layer is one of the most common causes of data breaches, yet many companies still leave their applications unprotected. Securing your applications...
Protecting your information and data is nearly a requirement in today's world. Previously, computer information was only susceptible to prying eyes after your dial-up connection was established. Once you were...
  When purchasing bundled software and hardware, many of us wish to know how long the manufacturer will support the product. With MS Windows, the product lifecycle of each version of Windows...
By Rainer Enders   There is a difference between enabling a mobile workforce and enabling a BYOD (bring-your-own-device) workforce.Companies need to mobilize, that is without question -- but for too long...
By Ken Westin You have 5 minutes to explain why you are relevant to the business and define your organization’s risk posture…ready…set…GO!!! Recently I presented for the first time at Ignite....
By Mike Gault The cyber security market in 2012 is estimated at $60 billion, yet adding more and more layers of perimeter security may lead to a false sense of security...
  By Rafel Los Fair warning! This post is a little... lengthy, or as I like to think of it - "complete". Welcome to part 2 of a 4-part series on...
By Ian Broderick   The following is an explanation of what Cross-Site Scripting is and how it enables an attacker to inject client-side script into web pages viewed by other users....
According to a recent report from Symantec, targeted attacks on the IT networks of small businesses have doubled in the past six months.There were on average 58 targeted attacks a day...
U.S. government officials speaking at a conference held at Georgetown University expressed concerns over the rapid expansion of threats in cyberspace posed by state sponsored entities and criminal syndicates, according to...
  By Tom Sloan According to the recently published 2012 Career Impact Survey released by ISC, the information security profession offers not only stability but upward mobility. Results of the survey found...
By Danny Lieberman   So often my ISP calls us up and asks to speak with the IT manager or the person who is responsible for the network.This time it was...
By Vincent Capasso According to McAfee, predicting future threats can be a hit-or-miss exercise for a security research organization. The past 12 months were a transformative year in many ways as we...
p {text-indent: 0cm} p.box{border:1px solid #000;margin:0;padding:10px;} span.ad-article { float: left; margin:0 15px 20px 0; padding:0; text-align: center;} By Jim Finkle BOSTON (Reuters)—Japan's Trend Micro Inc, the No 3 maker of...