Debate: The NSA’s mission to crack encryption upholds national security
In this month’s debate, we received a number of responses to our debate topic this month, which covers the NSA’s attempts to crack encryption methods.
In this month’s debate, we received a number of responses to our debate topic this month, which covers the NSA’s attempts to crack encryption methods.
Using Big Data for security is the “new hotness,” says Holly Ridgeway, SVP and CISO enterprise systems at PNC.
This month’s threat of the month is the major zero-day vulnerability that affects Internet Explorer versions 6 through 11.
Recent attacks on a number of major websites were traced back to one source: Melbourne IT, an Australian domain name registrar.
Web applications as front-ends for databases provide the way into an enterprise through simple attacks, such as SQL injection. We have solutions.
Personnel announcements and M&A activity: Ipanema Technologies, Kabel Deutschland, CrowdStrike, Windward IT Solutions, F5 Networks and more.
This month’s news briefs include important advisories issued by RSA and NIST, as well as a critical update released by Microsoft.
Service desk engineers and managers are in high demand.
CSOs need to be able to function at the highest levels of an organization while not being tethered to a specific department or operational function.
The first step toward better protecting an organization is to learn how cyber attacks work.