Top

LATEST PUBLICATIONS



How to manage IT risk without killing innovation

April 25, 2018

Via: CIO

Startup slogans are inescapable in tech: Move fast. Break things. Minimum viable product. These are exciting ideas, for sure, but to put them to use in IT, you’ll need to tailor them to your context. For IT executives running established […]


Microsoft Takes Security to the Edge

April 18, 2018

At RSA Conference this week in San Francisco, Microsoft announced new tools and technologies aimed at protecting connected devices from security threats. First on the list is Azure Sphere, what Microsoft describes as a holistic solution built for securing microcontroller […]


3 Security Measures That Can Actually Be Measured

April 3, 2018

The massive budgets devoted to cybersecurity need to come with better metrics. Why is so much of technology security such a mystery? In particular, why does it have so few metrics? I get it. For any given company, if there […]


Network security

Senators chart path forward on election security bill

April 23, 2018

Via: The Hill

Senators are working to again revise legislation designed to help guard digital voting infrastructure from cyberattacks after meeting with state officials. Sen. James Lankford (R-Okla.) told The Hill that he expects to work out the final details of the bill […]


Network security

Blockchain Technology: Conflicting Perspectives on Enterprise Security From the RSA Conference 2018

April 23, 2018

Via: Security Intelligence

Blockchain technology was perhaps the most controversial topic at last week’s RSA Conference in San Francisco. It’s fitting, because distributed ledger technologies are also hotly debated in conversations about enterprise technology. For most organizations, the idea of blockchain is suspended […]


Virus & Malware, Vulnerabilities

Take These Steps to Secure Your WordPress Website Before It’s Too Late

April 23, 2018

Via: Security Affairs

You might have heard that WordPress security is often referred to as “hardening.” While the name might cause a few eyebrows to raise, overall, it makes sense. To clarify, the process of adding security layers is similar to boosting the […]