submarine periscope 101722825
roomba 650

abstract image business handshake cityscape 100708907 large

Why can’t security have SLAs?

You always hear about the five-nines. The typical amount of time laid out in a service-level agreement that a network should be online. Can that same premise pertain to security? Vendors said no.

car salesman auto dealer keys

Cybersecurity pros pushed into sales roles

It has gotten to the point that besides trying to secure the product, companies are asking their security pros to explain and sell the product to prospective clients.

boy slingshot threat

‘Sometimes it is necessary to bend the rules a bit’

A recent survey asked employees why they didn’t follow the rules and much of the response sounded a bit like a child answering their parent. They might have been bored or there were too many rules to deal with.

9 expand knowledge training
Q&A

Does third-party security awareness training work?

Rapid7 security analyst describes the company’s direction with in-house vs. outsourcing training.

repair kit

Get 63% off This 76-in-1 Precision Tool Set For Smartphones, Laptops and Electronics - Deal Alert

This 76-piece repair kit contains everything you need to work on your smartphone, tablet, laptop, stereo, or anything else that requires precision instruments. Everything from screwdrivers, to a suction cup to a plastic spudger,...

Hacked, unlocked, unsafe.

Caught in the breach – what to do first

Since there is no way to prevent every cyber attack, incident response is crucial. Experts at the MIT Sloan CIO Symposium talk about what to do immediately after the bad news hits.

piazza diversity hiring

How the CISO can hire the right organization

Gartner and others have proposed that the first 100 days are critical to the success of the CISO. In this article, we suggest that setting of initial expectations during the hiring process, on the part of the organization and the...

code programming software bugs cybersecurity

Patch the Samba bug before a network worm exploits it

It isn’t at WannaCry-crisis levels yet, but the fact that Samba is so widely used means a network worm can really have a field day exploiting this vulnerability.

alert hacking threat detected

Proposed 'hack back' law would not have stopped WannaCry

On Monday, the Financial Times published a story concerning a proposed bill form Representative Tom Graves, a Republican from Georgia's 14th district. Graves has proposed changing the Computer Fraud and Abuse Act (CFAA) to allow...

artificial intelligence in the workplace

AI: The promise and the peril

Two panels at the MIT Sloan CIO Symposium this week focused on how to embrace the almost magical productivity benefits of artificial intelligence without leaving workers behind.

cybersecurity budgets

Cybersecurity ROI: Still a tough sell

Cybersecurity is a wise investment. But as a panel of experts at the MIT Sloan CIO Symposium said, it is difficult to put an exact number on it.

help support advice guidance signpost

What security leaders need to know about cyber liability insurance before a breach

Shawn Tuma talks about how security leaders can get the most out of their cyber liability coverage in the event of a breach

stock security

Cloud solutions: The danger of 'floating' contracts

In most cloud engagements these days, it is not only the customer’s data that is in the cloud, but also many key parts of the vendor contract as well. That is, the average cloud vendor today generally places several key areas of the...

Password entry

The 6 best password managers

Look to these Windows, MacOS, iOS, Android, and web tools to make your passwords stronger and your online life easier

dash button

Amazon's 2-For-1 Dash Button Deal Actually Nets You Two Free Dash Buttons - Deal Alert

Right now if you buy a Dash Button, Amazon will give you one for free in honor of National Pet Week. But they're still giving you the $4.99 credit after the first time you use it. That's two Dash buttons for free, really.

03 bounty hunter

10 things threat hunters watch for

Pursuing cyber threats is much like conventional hunting in that it requires patience, persistence and a keen eye, and when done correctly, it can be both exhilarating and rewarding. Threat actors do everything in their power to blend...

maze lost question direction wayward

5 common ways businesses lose valuable data

David Zimmerman, CEO and Founder of LC Technology, lists five ways individual employees and IT are causing companies to lose data, and some best practices for preventing a crippling data loss.

v1.00 10 00 31.still003
video

Vanquish, a cult classic, now in 4k! | Let's Play

Vanquish, the cult classic from Platinum Games, has finally arrived on PC thanks in part to a vocal fan base. Let's play through a bit of the beginning to see how it runs on a HP Omen X running an Intel Core i7 6700K and 2 Nvidia GTX...

Load More