74 Arrested in International Email Scam Schemes
June 12 2018A coordinated effort has led to the arrest of 74 individuals around the world on charges of defrauding businesses and individuals. The US Department of Justice today said it...
Read moreA coordinated effort has led to the arrest of 74 individuals around the world on charges of defrauding businesses and individuals. The US Department of Justice today said it...
Read moreSenior executives are among the favorite targets of malicious hackers and other bad actors, in part because they are more likely to hold valuable information — or have a...
Read moreEnterprise adoption of DevSecOps has surged in the past year, according to a study conducted at this year’s RSA Conference. DevSecOps is a great portmanteau word, but is it a...
Read moreNext read this: State of the CIO: IT-business alignment (finally) gets real 10 old-school IT principles that still rule 9 forces shaping the future of IT The dark secrets...
Read moreFederal authorities charged Marcus Hutchins with lying to the government and authoring a second piece of malware in addition to the Kronos banking Trojan. Any hopes that Marcus Hutchins,...
Read moreThe SANS Institute provides training related to cybersecurity and the safe use of technology within your organization. To provide this training, the SANS Institute captures and processes personal data...
Read moreNext read this: State of the CIO: IT-business alignment (finally) gets real 10 old-school IT principles that still rule 9 forces shaping the future of IT The dark secrets...
Read moreBug bounty programs grew along with payouts, which averaged $781 per vulnerability this year, researchers report. The past year was a big one for bug bounties, with more programs...
Read moreIT is evolving rapidly, and the skills required to succeed in IT are changing quickly as well. Cloud computing, cybersecurity and data analytics are just a few of the...
Read moreLack of integration also a big issue among decision makers. Business organizations are not applying the “KISS” principle to the tools they use to manage their security and operations....
Read more
Recent Comments