Case Study: Lifeline for the help desk
Enabling students to reset their own passwords relieved IT staff – and network congestion – at a North Carolina college. Greg Masters reports.
Enabling students to reset their own passwords relieved IT staff – and network congestion – at a North Carolina college. Greg Masters reports.
The right form of network security can – and will – support continuous monitoring and network security management initiatives.
In this month’s debate, experts discuss whether the biometrics on Apple’s iPhone 5s will evolve the security of personal devices.
BitDefender’s Alexandru Catalin Cosoi discusses role and what he’d like to see occur in the security space.
The greatest pleasure that we have in writing this section each year is seeing who has the innovation and staying power to make it to the Hall of Fame.
Don’t hang your hat on enterprise app store security, says Jack Walsh at ICSA Labs.
When we talk about the cloud, we need to realize that the concept of the cloud is a business, not a technical, construct.
A compendium highlighting 2013’s top mergers and acquisitions activity in the information security industry.
GRC is at once the biggest pain point (arguably) of most large organizations and the most important task that does not usually get done right.
We pay tribute to two security pros whose life’s work helped evolve the technology and thinking of the IT security industry.