Bug bounty programs grew along with payouts, which averaged $781 per vulnerability this year, researchers report. The past year was a big one for bug bounties, with more programs...
Read moreIT is evolving rapidly, and the skills required to succeed in IT are changing quickly as well. Cloud computing, cybersecurity and data analytics are just a few of the...
Read moreEnterprise IT Juggling 20-Plus SecOps Tools
June 10 2018Lack of integration also a big issue among decision makers. Business organizations are not applying the “KISS” principle to the tools they use to manage their security and operations....
Read moreCIO Leadership Live with Jack Clare, CIO and chief strategy officer at Dunkin’ Brands | Ep 9
June 10 2018CIO | May 9, 2018 In this episode of CIO Leadership Live, host Maryfran Johnson talks with Jack Clare, CIO and chief strategy officer at Dunkin’ Brands, about the...
Read moreFacebook Bug Sets 14M Users’ Settings to ‘Public’
June 10 2018The default sharing setting was accidentally changed for millions of accounts during a four-day period last month. If you haven’t checked your Facebook privacy settings in a while, now...
Read moreSecure Your Home Wi-Fi Network
June 10 2018Several years ago, creating a cybersecure home was simple; most homes consisted of nothing more than a wireless network and several computers. Today, technology has become far more complex...
Read moreCSO Online | Jun 5, 2018 Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build...
Read moreInsider threats — desktop attacks, security awareness, caffeine — all worthy contenders in our cartoon caption competition. And the winners are … There was an abundance of geeky humor...
Read moreNever Give Your Password Over the Phone
June 10 2018Background Passwords are something you use almost every day, from accessing your email or banking online to purchasing goods or accessing your smartphone. However, passwords are also one of...
Read moreT-Mobile is investigating a retail store employee who allegedly made unauthorized changes to a subscriber’s account in an elaborate scheme to steal the customer’s three-letter Instagram username. The modifications,...
Read more
Recent Comments