browse
Cloud Procurement Guide 2.0 Tackles Security, Encryption - 11/30/2016
Platform : Cloud Computing
Microsoft's decision to retire security tool is myopic - 12/5/2016
Platform : Security
How to Launch an Effective Cybersecurity Upgrade (That Won’t Drive You Crazy) - 12/2/2016
Platform : Cybersecurity
GPS 'Spoofing' is No Joke: Dangers of GPS Data Hacking Realized - 11/28/2016
Platform : Hacking
Cisco Talos Group Extends Security Flaw Responsible Disclosure Timelines - 11/28/2016
Platform : Security
The Trouble With Recounts in the Name of Hacking - 11/25/2016
Platform : Hacking
Cybersecurity Becomes Top Priority Program at Washington State University Campus - 11/28/2016
Platform : Training
IBM Launches Global Headquarters for Security Services - 11/16/2016
Platform : News
 

Last week's most popular technology story...

Microsoft's decision to retire security tool is myopic

Microsoft's claim that Windows 10 made obsolete an important enterprise anti-exploit tool was inaccurate, said a security analyst at the center that coordinates with the United States' cyber-alert organization. "Windows 10 does not provide all of the mitigation features that EMET administrators have come to rely on," Will Dormann, a vulnerability analyst at CERT/CC (Computer Emergency Response Team Coordination Center), wrote in a post to the group's blog last week...

Read Article

browse
Network Design Best Practices for Office 365
by: Riverbed
Information Technology | Software | Networking | Business | Office
Fraud Alert: Phishing - The Latest Tactics and Potential Business Impacts
by: Symantec
Information Technology | Software | Business | Security | Phishing
Take It or Leave It: Moving Your Business VoIP System
by: Ziff Davis
Information Technology | Hardware | Telecom | VOIP
A Prescription for Privacy
by: Symantec
Information Technology | Online | Security | Privacy
Fraud Alert: Phishing - The Latest Tactics and Potential Business Impacts
by: Symantec
Information Technology | Software | Business | Security | Phishing
Perfect Forward Secrecy-The Next Step in Data Security
by: Symantec
Information Technology | Online | Security | Data Security
 
Top 10s
Microsoft's decision to retire security tool is myopic- Editorial | Computerworld
Job Loss And Financial Damage: CIOs' Main Fears When Adopting Virtualization- Research | Information Week
The Problem of Our Surveillance Laws: Report Exposes Deeply Rooted Governmental Secrecy- Editorial | Electronic Frontier Foundation
Firefox Patched For Zero-Day Vulnerability- SecurityAlert | Eweek
How to use data to design the best market for your company- HowTo | CIO Magazine
Micro Focus offers SilkPerformer for mobile web app testing- News | Tech World
Virtual reality aims to transport lonely patients out of the hospital bed- Editorial | Mashable
CIOs Get Strategic As IT Budgets Stay Flat- Research | Information Week
Microsoft restores database app to Office 365 for small biz- News | CIO Magazine
Companies Eyeing 10% Productivity Gain Thanks to Automation- Research | Chief Executive

browse
How to use data to design the best market for your company - HowTo | Big Data
How to Launch an Effective Cybersecurity Upgrade (That Won’t Drive You Crazy) - HowTo | Cybersecurity
Writing a Book? How to Self-Publish and Build Your Brand - HowTo | Career/Personal Development
How to Build a Threat Hunting Team to Bolster Cyber-Security Operations - HowTo | Security
6 ways to add cybersecurity protections to outsourcing deals - HowTo | Security
Adopting Digital Change Inside the Enterprise - HowTo | Enterprise
7 ways to protect your ecommerce site from fraud, hacking and copycats - HowTo | E-Commerce
Windows Update on Windows 7 is fast again - HowTo | Windows 7