Security | News, how-tos, features, reviews, and videos
A number of news publications launched "Pearl Harbor" levels of hyperbole this week after the U.S. Senate did exactly as expected and killed the latest cybersecurity bill. Meanwhile, Obama signed a piece of paper that's designed to pro
General David Petraeus should not have been forced out of his post at the CIA, according to CIO.com blogger Constantine von Hoffman. But what's done is done, and people can and should learn from his mistakes.
Studies show that employees are engaging in rogue use of the cloud, even when IT organizations say they have clear formal cloud policies and penalties for violation of the policies.
Small business owners face numerous anonymous threats in the Internet era. While keeping bullies, trolls and extortionists at bay online is similar to what you should do in real life, repairing the damage they can do to your business requires a diffe
Too many security practitioners still view identity as a zero-sum game, so if attackers can fool identity verification at log-on, they win access to everything. Enter, identity threat detection and remediation (ITDR).
Three members of Congress who supported the much-maligned privacy act lost in the last election, while a candidate attacked for playing World of Warcraft won -- likely because of that attack. Also a roundup of other IT security stories from the past
The promise of big data is enormous, but it can also become an albatross around your neck if you don't make security of both your data and your infrastructure a key part of your big data project from the beginning. Here are some steps you can ta
Hackers ain't what they used to be. The latest hacktivist offensive went after an Aussie hippie festival, a group that helps people with disabilities and other symbols of oppressive authoritarianism. They couldn't even take down Zynga, the
CIO.com blogger Constantine von Hoffman says DHS's call for private-sector competitors to share resources with each other and the government proves two things: 1) The agency doesn't know jack about business; and 2) it doesn't practice
As recovery efforts in the wake of Hurricane Sandy continue, it's time to think about how your IT organization will prepare for the next disaster.
BYOD can wreak havoc on the tenuous relationship between IT and the business. But networking giant Cisco, which has a sophisticated BYOD plan for employees, is hoping more reasonable BYOD policies that permit personal cloud services will help bridge
Sponsored Links