Technology Industry

Technology Industry | News, how-tos, features, reviews, and videos

binary world map and cybersecurity lock

Cyber to the people! The democratization of security

How can mid-market companies start the revolution of the democratization of the cyber security industry?

forensics threat hunter cyber security thumbprint

What your enterprise needs to know about cyber threat intelligence

Understanding the threats and vulnerabilities in your IT environment.

supply chain

In the cloud era, government can only be as secure as its supply chain

While regulation is often seen as antithetical to technological progress, the supply chain is an area where clearly-defined, reasonable directives have had a tremendously positive effect on the security and technological leadership of...

Passenger view of an airplane wing above the clouds. / travel / journey / transportation

Where Chicken Little meets information security

Outside of a movie theater, your plane won’t be hacked out of the sky.

digital twins woman in profile ai mirror duplicate duo pair

Building relationships using digital identity

The how and why of building an identity platform based on reciprocal altruism.

donuts primary

Getting to know you: How continuous identity and access management transforms secure access

Better access decisions come from authentication solutions that work constantly to get to know users and resources better and better over time.

gdpr

The unintended consequences of GDPR

This is not what the regulators had in mind. Business leaders, ignore at your own peril.

artificial intelligence ai blockchain digital learning chip

Machine learning: It’s all about the use cases [baby]!

With so much hype around “machine learning,” how can practitioners better understand which IT security applications can actually benefit? Experts suggest: forget the buzz – it’s the outcomes that are the most important.

security vulnerabilities in the IoT Internet of Things

Here I am, hack me

Bad actors are constantly trying to find ways to penetrate our networks. Recent attacks at LabCorp and the City of Atlanta demonstrate, however, that we are putting the welcome mat out for hackers by leaving key network ports open. ...

speech bubble constructed from abstract letters

Cybersecurity acronyms businesses need to know

The cybersecurity market is becoming saturated with numerous acronyms representing technologies and concepts that may be alien to many. Here is a breakdown of some of the most common acronyms, how they relate to each other, and where...

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Risks associated with third-party access

Security processes to implement when dealing with third-party access to your company’s network.

vintage voltmeter gauge

Small biz simplifies and moves the needle

Smaller orgs are working to fulfill mission-critical functions and are actually moving the security needle. Meanwhile, enterprises seem to get distracted by the bright shiny objects at the expense of establishing strong preventive...

03 cryptography

How to improve your crypto-agility

As the sheer number of connected devices continues to rise, securing these devices, and becoming “crypto agile” is a key component of an organization’s effort to become more agile. Read on to discover how to improve your...

mobile phone payment

What’s next in payment security?

The three fundamental changes that every card-accepting business and payment solution provider must know.

Election 2016 teaser - A hacker pulls back the curtain on United States election data

“Political hack” takes on new meaning in the age of cyberwarfare

Political hacking is a real and present danger, but more advanced detection and response capabilities will help defend our democratic institutions better than what is current practice.

Dictionary definition of language under a magnifying lens.

The new definition for threat prediction

Security is hard enough without inaccurate understandings of your team setting unrealistic expectations for success. Security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings and...

california on map of western usa 97656788

Is California’s Consumer Privacy Act of 2018 going to be GDPR version 2?

Discussing the California Consumer Privacy Act of 2018, which covers businesses that collect or sell information about California residents. Some view it as the General Data Protection Regulation 2.0.

CSO: Have you met these hackers? [slide 02]

Rough trade: Why financial markets will need to stay on top of their game

While election hacking is making headlines and Dan Coats is warning about 9/11 style cyberattacks on the US, it is our financial markets that may require the most immediate laser focus. The future preservation of our financial...

abstract image of business silhouettes in blurred motion

The best way to connect with a distracted and time-crunched security buyer

These four techniques will help you rise above the noise – warning some of it may be uncomfortable.

Artificial Intelligence robotic in wheat field

A prominent place at the table for rural technological advancements

Rural areas are the front lines for some of the most important gains technology is enabling in modern society. From blockchain to automation, a variety of emerging technologies are modernizing business models in rural areas around the...

Load More