Young people canít ignore the news. Data breaches are everywhere and theyíre beginning to realize that itís up to them to keep our personal and national information private.
By Emily Johnson Digital Content Editor, InformationWeek, 9/21/20170 comments | Read | Post a Comment
The first two quarters of 2017 have been the most active ever in five years from a cybersecurity investment standpoint. Here's how the third quarter has shaped up.By Jai Vijayan Freelance writer, 9/20/20171 Comment | Read | Post a Comment
Two major standards bodies have grabbed the bull by the horns in an attempt to make workloads and services mobile across clouds.By Charles Babcock Editor at Large, Cloud, 8/1/20173 comments | Read | Post a Comment
Jeff Moss, founder of the hacker conference, is planning to host a full-blown election and voting system for hacking in 2018 at DEF CON, complete with a simulated presidential race.By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/28/20172 comments | Read | Post a Comment
FireEye CEO Kevin Mandia talks about the state of the IT threat landscape and where enterprises should focus their attention when it comes to cybersecurity. By InformationWeek Staff , 6/23/20170 comments | Read | Post a Comment
The average total cost of a data breach declined 10% year-over-year around the world, but in the US edged upward by 5%.By Kelly Sheridan Associate Editor, Dark Reading, 6/20/20171 Comment | Read | Post a Comment
A Cisco report claims $2.3 trillion is waiting to be realized through digitized services, city management; cites Houston, Oslo, Barcelona as examples. By Charles Babcock Editor at Large, Cloud, 6/16/20173 comments | Read | Post a Comment
Study shows companies running out-of-date OSes were three times more likely to suffer a data breach, and those with the outdated browsers, two times more likely.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/8/20171 Comment | Read | Post a Comment
Cloud Security Alliance sees danger, issues guidelines for how we'll need to secure the connected vehicle environment in the future.By Charles Babcock Editor at Large, Cloud, 5/26/20170 comments | Read | Post a Comment
The EU's new razor-toothed data privacy law could either rip you apart or help you create the best security program you've ever had. Here's how. By Sara Peters Senior Editor at Dark Reading, 5/25/201714 comments | Read | Post a Comment
Google, Kaspersky Lab and Symantec all have found common code in the WannaCry malware and that of the nation-state hackers behind the mega breach of Sony.By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/15/20172 comments | Read | Post a Comment
EO calls for immediate review of federal agencies' security postures, adoption of the NIST Framework, and a focus on critical infrastructure security.By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/11/20170 comments | Read | Post a Comment
Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.
By Kelly Sheridan Associate Editor, Dark Reading, 4/24/20171 Comment | Read | Post a Comment
IoT security is essential for the Internet of Things to reach commercial success. Here's one way to protect this technology and data from hackers.By Jessica Davis Senior Editor, Enterprise Apps, 4/11/20175 comments | Read | Post a Comment
In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.
By Ericka Chickowski Contributing Writer, Dark Reading, 3/31/201710 comments | Read | Post a Comment
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.