"Next-generation" endpoint protection or next-gen AV has been getting a lot of press recently. But what does the term actually mean? For IT security managers under pressure, the most important thing isn't the latest buzzword, but
Every time there's an election, the topic of hacking comes to the surface. During a presidential election, that conversation gets louder. But can you really hack an election? Maybe, but that depends on your goals.
Election hacking has become a key topic during this year's presidential elections. In this modified edition of CSO Online's Hacked Opinions series, we explore the myths and realities of hacking an election with a number of security...
Someday, sometime, an employee with access to sensitive data, intellectual property, or trade secrets is going to leave your company, which makes their departure risky to the organization. Sure, you've "trusted" them as part of their
This USB 3.0 flash drive is designed to keep your files safe. The anodized, aircraft-grade aluminum housing is waterproof to 200 meters, vibration-resistant, and shock-resistant. USB 3.0 means read speeds up to four times faster than...
U.S. Sen. Mark Warner, D-Va., on Monday urged the U.S. Securities and Exchange Commission to investigate whether Yahoo met its legal obligations to keep the public and investors informed about a massive breach of 500 million Yahoo...
The first of a two-part series on IT certifications' multifaceted contribution to a prosperous, secure career in technology's busiest and most promising sectors and senior management in any enterprise.
The fact that trusted employees or contractors often create problems for the organizations they work for, is unfortunate, but remains a fact. But why? Companies take steps to protect themselves against the risks that are inherent when
Handling both security and IT duties involves a daily balancing act for the resource-constrained IT organizations that must take this approach. But along with the challenges, there can also be benefits.
When it comes to security, who’s in charge, where do roles and responsibilities overlap, and what are the biggest challenges to aligning infosec and business goals? A joint CSO, CIO, Computerworld survey sheds some light.
The way people communicate is changing, which drives the need for purpose-built solutions to ensure compliance. In this age of growing data proliferation and the need to use that data, it is pivotal for companies to become proactive