Security in the U.S. power sector is taken very seriously. But of course security can always be tighter.
A new report shows a direct link between security problems in small businesses and enterprise security headaches. This happens when SMBs are suppliers or resellers for enterprises and are therefore connected.
Our manager’s company uses a lot of third-party vendors, and some of these relationships have been in place for years. What will happen when he goes back to assess their security risks?
If people spent half as much time protecting their data as they do trying to prevent the data being protected, we'd all be far better off.
A new service offers to keep all your Web browsing on its servers. It could be the answer, despite the risks of contracting with a startup.
The new ‘enhanced’ security promised for CES turned out to be a joke, but the illusion of safety provided by security theater really fell away on the way home.
The effort to meet Level 1 PCI compliance reveals a new security mantra to our manager.
There’s something about a New York cab that lends itself to imparting lessons on technology and security.
Security industry prognosticators rely more on marketing, hype, and our own bad memories than any knowledge of security past, present or future.
It’s self-defeating to try to protect data by treating it all as if it’s equally sensitive.
Top editors from enterprise IT brands Computerworld, Network World, CIO.com and CSO offer up their predictions for things that will happen in IT in 2016.
By Keith Shaw | 16 December, 2015 18:07
For our security manager, the two big issues are the browsers his users employ, and the versions supported by the corporate website.
By By J.F. Rice | 16 December, 2015 18:00
Looking out for your company can mean looking beyond the perimeter.
Toys are dangerous. I'm not talking about toys with sharp edges, toxic materials or parts that constitute a choking hazard. I'm talking about hacking -- a new threat to the safety of children. Last week, the risk got real.
A backdoor mandate will render computer systems, networks and devices totally insecure, making all of us more vulnerable to the whims of criminals and terrorists.
A breach that doesn’t result in anyone compromising any data is something like the proverbial tree that falls in the forest with no one around. Is it truly a data breach?
By Evan Schuman | 01 December, 2015 14:00
At least we’re finally officially in the transition period, but it could last for years.
The hacking group’s activities have always seemed dubious, but in this case, success will be quite welcome.
Diminishing returns in network security.
A couple of worthwhile security initiatives will languish if staffers have no incentive to work on them. Solution? Tie them to bonus pay.
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- FTServer EngineerNSW
- CCSolution ArchitectNSW
- CCTest ManagerQLD
- CCContract Programmer (Crystal Reports/JAVA/SQL) 160129/P/vhs-cAsia
- CC.NET DeveloperACT
- FTJunior Developer | C#, MVC & SQL | Class FinanceNSW
- CCSenior Wintel EngineerNSW
- CCJava DeveloperVIC
- CCSystem AdminVIC
- FT.NET Tech LeadVIC
- CCContract Software Engineer (Crystal Report/JAVA) 160129/SE/vccAsia
- CCSAP DS and BI SpecialistVIC
- FTSenior Front End Developer Required Working World Leading Digital TeamVIC
- CCSenior Information Security SpecialistNSW
- FTNetwork EngineerNSW
- FTTechnical WriterNSW
- FTMobile Designer / Developer - IOSNSW
- CCSenior Visual DesignerNSW
- CCSenior Server EngineerNSW
- FTJava or Ruby Web DeveloperVIC
- CCSenior Android DeveloperNSW
- FTManual Software TesterNSW
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- CCTeradata DeveloperNSW
- FTJava Web Development OpportunityVIC
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- These are the fastest growing IT jobs
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Most enterprises plan to boost Cloud use this year
- Google didn't abuse its position in Streetmap case, UK court rules
- GitHub apologizes for ignoring community concerns
- New Chromebook won't break with 365-pound person standing on it
- Nasdaq to use blockchain to record shareholder votes
- Pwn2Own contest puts US$75,000 bounty on VMware Workstation bypass
- Intel SSDs may get speed, capacity boost with new Micron chips
- Five sue Apple over Error 53 and bricked iPhones
- AT&T to run field trials of 5G wireless in Austin this year
- Apple's iPhone sued for infringement of touch feedback patents
- Need data-science skills? Now your team can learn together