Technology Industry

Technology Industry news, information, and how-to advice

a byod education image.jpg
Black Hat 2015

screen shot 2017 05 13 at 11.28.04 am

PETYA – Darwinism applied to cyberspace

PETYA ransomware struck on 27 June. The cure was released in April. Why did anyone get infected?

cloud security

Welcoming the clouds in our eyes

Bean counters want to minimize the number of cloud vendors a company uses. But multiple cloud service providers might actually be more secure!

career success

Your dream job is waiting!

I'm a senior Cloud Compliance Architect, but how did I get here? Lots of mountains to climb, education, experience and certifications. I hope to inspire our young people to never give up, keep focused, have a passion for what you do...

diverse group of young women

Why go to women-focused technology events?

Why would a woman who's perfectly comfortable in groups predominantly populated by men want to step out of her comfort zone to attend women-focused technology groups?

cybersecurity budgets

Top 5 cybersecurity facts, figures and statistics for 2017

Predictions and observations provide a 30,000-foot view of the cybersecurity industry.

money handout

Cybersecurity spend: ROI Is the wrong metric

Think about what your network defenders do throughout the day, every day, in the course of getting their jobs done. Can you describe it in one sentence? How would you characterize the thousands of tasks that the InfoSec team fields...

globe with world map and circuit board in background digital 200213603 001

IDG Security Day features events in 9 countries

On June 21, IDG Enterprise will follow the sun and discuss the challenges organizations across the globe face when attempting to identify or mitigate risk. To do this, IDG has organized Security Day, a global event that is coming to...


CRASHOVERRIDE poised to affect Natural Gas?

New malware affecting Ukraine's electric grid poses a future threat to US natural gas industry

hacked hacker breach security

Risk aware IAM for an insecure world

In a world full of uncertainties and data breaches, IDaaS providers must deliver more than ever, faster than ever, for businesses to succeed at building trusted relationships and delighting customers at every interaction.

Election 2016 teaser - Electronic voting security for digital election data

We can't accept election hacking as a new normal

As the investigations into whether Russian hackers influenced the 2016 Presidential election in the US continue, the rest of the world prepares for the new normal of election hacking.

shell game primary

Be wary of vendors touting superior data science

Security vendors are jumping on the data science, machine learning, AI bandwagon, but don't believe the hype. Here's how to make sure the vendor you're evaluating can make good on its promises of data science prowess.

teamwork puzzle organized pieces together

Ancient lessons for a modern security program

As security programs become more and more complex, the need to see as much of what’s happening as possible is becoming one of the most critical aspects of success for any organization. But with complexity comes a need to specialize,...

unfilled tech jobs

Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021

The cyber crime epidemic is expected to triple the number of open cybersecurity positions to 3.5 million over the next five years.

digital europe circuit board barbed wire barrier obstacle thinkstock

May 18th: The birthday of the DPO

The importance of the European Global Data Protection Regulation and its implications for cybersecurity in America.

machine learning ai artificial intelligence

FireEye 2.0: Cyberhumans as a Service

FireEye CEO Kevin Mandia discusses the company's approach to cyber crime and cybersecurity.

mls 016 wwdc2017predictions v1.00 01 19 20.still001

WWDC 2017: Our Top 3 Predictions

Here's what you can expect to be announced during the WWDC keynote on Monday, June 5.

cybersecurity shield and gear image

Cisco and IBM announce historic cybersecurity partnership

Cisco Security and IBM Security join forces to battle cybercrime, helping customers reduce the time to detect and mitigate threats.

minecraft illagers

Mining the Minecraft generation

New ways to approach and fill the jobs skills gap

Load More