Where Can IT Get Expert Guidance for Managing Android in the Enterprise?
IT decision-makers is, “How can I be certain I am managing and securing Android with the best tools and technical resources available to …
IT decision-makers is, “How can I be certain I am managing and securing Android with the best tools and technical resources available to …
An investor rights law firm is investigating potential security fraud claims on behalf of shareholders of Apple and may end up filing a …
The final Oracle Critical Patch Update (CPU) of 2018 fixes 12 Java SE-related vulnerabilities and a dozen new WebLogic flaws, part of the …
AlienVault SVP Russ Spitler encourages participation in the large-scale crowdsourced OTX threat intelligence community – as well as the …
The Oracle July 2018 Critical Patch Update (CPU) fixes eight (8) Java SE-related vulnerabilities, all of which can be remotely exploited by …
A report from the Departments of Commerce and Homeland Security provides five goals for protecting infrastructure from botnets and other …
The General Data Protection Regulation (GDPR) was created by the European Commission and Council to strengthen and unify Europe’s data …
The UK’s National Cyber Security Centre (NCSC) has published a series of new application security recommendations for businesses that are …
In April 2018, the Center for Audit Quality (CAQ) released a document to help board directors fulfill their fiduciary duties regarding the …
Forward-looking organizations should view this as an opportunity to reevaluate their cybersecurity posture and install best practices that …
People with proper guidance are 40% more likely to create a secure password. According to research led by the University of Plymouth, in …
“Today, the importance of data management and technology to business is analogous to the importance of electricity and other forms of …
The U.S. Securities and Exchange Commission has released revised cybersecurity guidance for publicly traded …
The Securities and Exchange Commission has issued an updated guidance for public companies in preparing disclosures about cybersecurity …
Technology companies are increasingly joining together to develop and promote the adoption of international “norms” and other rules for …
Shortly after the Target breach in late 2013, the SEC began a cybersecurity “sweep” across a selection of 50 registered investment advisors …
The U.S. Securities and Exchange Commission is planning to update its 6-year-old cybersecurity guidance for how publicly traded firms …
Report: SEC Plans Breach Reporting Guidance Refresh Regulator Set to Revise 6-Year-Old Cybersecurity Rules Mathew …