Debate: Security training is effective in preventing workers from clicking on malicious links and attachments.
In this month’s debate, two experts discuss whether security training is an effective strategy in the workplace.
August 01, 2013
In this month’s debate, two experts discuss whether security training is an effective strategy in the workplace.
Federal agencies tasked with Americans’ safety can find other ways to fulfill their duties without stomping all over the U.S. Constitution and Bill of Rights.
Organizations today have a master data model to drive efficiencies in system design. How about a similar approach for the enterprise security program?
Malware is increasingly being created for tablets and smartphones, and that is our threat of the month.
The endpoint has taken on both new importance and new dimensions in the overall information protection scheme.
This month’s company news includes the departures of Graham Cluley and Carole Theriault from Sophos, the acquisition of Aveksa by EMC, and more.
A retired U.S. Marine general may be the source of the public disclosure of Stuxnet, an easy-to-exploit Facebook vulnerability was unveiled, and other news around the security industry.
Former Booz Hamilton contractor Edward Snowden was no ordinary insider when he stole NSA data. To the contrary, he had every intention to purloin top-secret documents.
Enterprise resource planning (ERP) solutions provide the core IT systems for a business, and include financial, accounting, sales and other apps. As a result, experienced ERP systems administrators and application developers are critical.
This month’s “Me and My Job” features Sasan Hamidi, CISO at Interval International.