The top news stories for August 22, 2014.
The top news stories for August 20, 2014.
It is literally impossible to prevent a security breach with 100 percent certainty, writes IT security expert Dimitri Vlachos. But a good defense starts with examining your privileged access policies.
Despite increased public pressure and government legislation on organizations to report IT security incidents, those disclosures rarely include differentiated of actionable information, a new study finds.
The lack of adequate security for industrial control systems is "shocking" and "insane," asserts Stefan Luders, computer security officer at European scientific research center CERN.
While BYOD conjures up security nightmares for IT departments, it can have significant benefits for enterprises, such as increased employee satisfaction and productivity, as well as reduced training and hardware costs.
A majority of companies experienced some sort of external cybersecurity incident in the past year, and cybersecurity breaches are now driving organizational strategy for most of them.
The explosion of BYOD devices on the network and the need for greater mobile network density prompted the University of Miami to make a major upgrade to their Wi-Fi network.
It's no secret that the mobile market is transforming the enterprise. Here are 10 things that CIOs need to know to master enterprise mobility.
The need for security in virtual environments escapes many IT pros, yet a majority understand the importance of virtualization to their IT infrastructure.