
Why can’t security have SLAs?
You always hear about the five-nines. The typical amount of time laid out in a service-level agreement that a network should be online. Can that same premise pertain to security?
Vendors said no.

‘Sometimes it is necessary to bend the rules a bit’
A recent survey asked employees why they didn’t follow the rules and much of the response sounded a bit like a child answering their parent. They might have been bored or there were too many rules to deal with.

What not to get Mom for Mother’s Day
With Mother’s Day just a few days away, this is the day that you thank your Mom for her love and support. … But don’t thank her with a gift card.

Medical devices that could put you at security risk
You remember the talk about former Vice President Dick Cheney's pace maker being susceptible to hackers, but here is a list of some lesser known medical devices that can scare the life out of you.

10 interview questions for hiring cloud-literate security staff
The answers will paint a picture of whether this candidate understands cloud security.

Social engineering scam targets Indian call center
Call centers in foreign countries can be at times ripe for social engineering. Most operators are supposed to stick to a script. Find out what happened when the operator left that script.

12 ways to defend the network inside and out
Wikileaks is consistently sharing information with the public that was intended to remain confidential, if not top secret, by organizations thought to have the toughest security in place. Add in the numerous other breaches reported in...