FireEye, like all companies, wants to protect its intellectual property. But it needs to realize that security companies aren’t perceived like other companies.
SSO will bring several benefits, but our manager has to be prepared to address any security lapses that could accompany it.
All companies need to pay more attention to the experience that ordinary users have when they try to install new products and upgrades.
It’s a matter of getting product developers to overcome their naïveté, ignorance and laziness. Harsh? Yeah, but the truth hurts.
That’s what hackers are — they should be feared, but our fears are completely out of proportion.
Famous shipwreck holds many lessons for the cybersecurity community
By Jon Oltsik | 02 September, 2015 18:20
The annual security conference was a chance to go deep. But back in the office, how do you get 100% of the company’s employees to complete the security awareness training?
It’s time to put Flash out of our misery once and for all. And, thanks to Google, it may finally happen.
Google has made a big leap forward with real-time image recognition that can be applied to pedestrian detection. This is good news for potential accident victims out there. But the privacy implications!
By Erika Morphy | 28 August, 2015 21:00
IT pilot fish goes to work at a large retailer's distribution center, where the policy is that passwords must be changed every 90 days -- which turns out to have unexpected consequences.
Oracle Chief Security Officer Mary Ann Davidson let loose a long rant about people who dare to look into the security of the company’s products. Oracle quickly backed away from those remarks, but has it faced up to the fact that its CSO has some wrongheaded notions about her own area of expertise?
By Steven J. Vaughan-Nichols | 25 August, 2015 19:49
Shadow IT brings many security issues, but since these systems are not on IT's radar, they do not get factored into overall risk management strategy. Here are some practical suggestions.
By Robert C. Covington | 24 August, 2015 20:00
Data management, scale, and algorithmic strengths may give Facebook an advantage in the threat intelligence platform sharing platforms market
Wi-Fi can be done securely, even at a hacker conference like DEF CON. Just avoid open networks and Android.
By Michael Horowitz | 24 August, 2015 02:30
Attending both for the first time was a chance to compare and contrast.
Non-compliance is a risk, and the Attorney General's office carries a big stick for those who don't follow the rules.
This retired pilot fish notices that nothing has shown up in his email in-box in almost 12 hours, which almost never happens. And when he tries his broadband provider's web mail access, he's got another problem.
We bought a next-generation firewall, as I had hoped we would. The real trick, though, was getting the IT department to take full advantage of all of its advanced functionality.
By By Mathias Thurman | 18 August, 2015 02:33
Critical data breaches and hacking incidents have entered the mainstream consciousness. In one way this is good, as people are becoming more aware of the types of things that can happen and taking a closer look at how they use technology.
By By Rhonda Chicone | 18 August, 2015 02:21
The IT department was reluctant to take full advantage of the advanced functionality. So our manager annoyed them into compliance.
With increased mobility in the workforce, the market for remote support solutions has increased by 35% in the last year and as demand for these solutions increases, so do the options for service providers. <p> This whitepaper provides key features an IT decision maker should look for when selecting a remote support solution such as core functionality, usability, customisation, security, scalability and deployment model.
- FTLevel 2 IT Support TechnicianVIC
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- FTSenior Systems Engineer | Design projects | SMB & Enterprise clientsNSW
- CCWeb / Drupal DeveloperNSW
- FTSystems Administrator - Managed ServicesNSW
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
- FTAndroid DeveloperNSW
- FTLinux Administrator with AWS & DevopsNSW
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- FTSite Reliability Engineer - Java DevOpsNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
- FTManual Test Engineer | Financial Institution | Web testingNSW
This infographic compares legacy backup solutions with modern data protection solutions, showing legacy backups shortcomings in pivotal areas of data protection, such as application awareness, support for cloud tiers and more. Check out this infographic to learn why modern data solutions deliver more benefits than legacy backups.
- Cisco dedicates security project to 'pissing off the bad guys'
- Beware of Oracle's licensing 'traps,' law firm warns
- Apple boosts iMac screen resolution, lowers price of top-end 27-in. machine by 8%
- UL creating standard for wearable privacy and security
- SANS: 20 critical security controls you need to add
- Tibco jump-starts integration in the cloud with two new tools
- Google adopts single sign-on for more desktop, mobile apps
- Windows tablets for business hit 10% share in second quarter
- Windows 10 Insider dawdlers face blank screens Oct. 15
- Twitter cuts engineering team, lays off one in 12 employees
- SAP unwraps Project Orca and gives it a new name
- VMware brings Michigan to Europe to boost virtual networking
- Node.js adds long-term enterprise support version
- CommBank Offers app piloted at Westfield Hornsby
- Adobe teams with Dropbox as part of Document Cloud upgrades