Technology Industry

Technology Industry | News, how-tos, features, reviews, and videos

Black Hat 2015
poaching talent fishing lures bait catch recruit

idg quip

Empower your teams with Salesforce's productivity platform — get started for free

Sign up for a free video to see how Quip can benefit your enterprise today, and get contacted for a personalized free trial of the platform.

australia law legal

Australia and Huawei: Why the ban?

National security questions have resulted in mega smartphone manufacturer Huawei being banned by the Australian government from participating in the that nation’s 5G network rollout.

women gender program code monitor

Have we doubled the number of women in infosec?

According to a recent (ISC)2 report, women now comprise 20% of cybersecurity workers. But without defining what jobs are being included, it’s unclear whether we’re truly making progress.

network iot world map us globe nodes global

Cybersecurity: A global threat that we can control

Protecting data and thwarting cyberattacks now have ascended alongside dealing with natural catastrophes as the most pressing threats demanding the world’s full attention.

data security encryption

Can owning your company’s encryption lead to better security?

While the current vendor environment clearly poses significant challenges and risks to businesses entrusting them with their data, use of encryption can, at least in many cases, materially mitigate that risk. The devil, however, is in...

digital transformation man looking up at sky change future forecast by greg rakozy unsplash

2020 security predictions: What to look for and how to benefit

The coming flood of turn-of-the-decade forecasting offers a great opportunity to reorganize business plans, security plans and even career plans – if you are watching for the right things.

tt19 003 thumbnail
video

What's ahead for cybersecurity in 2019: TECH(talk)

J.M. Porup, senior writer at CSO online, joins Juliet on this week's episode of TECH(talk) to discuss trends in ransomware, IoT security and enterprise cybersecurity roles.

01 intro prediction

10 cybersecurity trends to watch for 2019

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead.

1 volume of data breach pile of paper confidential documents

The politics of ‘Have I Been Pwned’

Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.

a hooded figure targets a coding vulnerability

Breaches, market volatility and the government shutdown: Security in the crosshairs

If the start of 2019 is anything to base the year ahead on—with data breaches, shakiness in the market and the government shutdown negotiations at an impasse—cybersecurity experts are going to have their hands full with increasingly...

1 darkweb marketplace

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

mobile apps

Data Privacy Day 2019

GDPR was just the beginning. It started in the EU, but it’s waking up the world on just how much our privacy is being violated.

thumbnail
video

CIO Leadership Live with Joseph Spagnoletti, CIO at US LBM | Ep 19

In this episode, host Maryfran Johnson talks with Joseph Spagnoletti, CIO at US LBM, about IT innovation and digital transformation.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

Take time to think about security amidst the greatest gadget show on the planet – CES

Let us put our thinking caps back and ask the right questions.

big data messaging system / information architecture / mosaic infrastructure

Big data: too valuable and too challenging to be overlooked

The positive potential of big data is enormous, spanning virtually all industries and impacting both the public and private sectors. However, we must also be mindful of safeguarding big data as much as collecting and utilizing it.

8 authentication basics password identity protected security

Managing identity and access management in uncertain times

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.

Facebook / privacy / security / breach / wide-eyed fear

What the recent Facebook exposé can teach security leaders

The biggest social media snafu of the year has lessons for enterprise security professionals.

sequence 01.00 25 06 04.still001
video

CIO Leadership Live with Elizabeth Hackenson, CIO at Schneider Electric | Ep 18

In this episode, host Maryfran Johnson talks with Elizabeth Hackenson, CIO at Schneider Electric, about talent acquisition, Schneider Electric's new capabilities on mobile devices, and the value of having a "healthy paranoia" about...

Load More