In this era of regular breaches, security awareness is a must. But how well do employees know their firms’ IT security policies? We reveal all.
Why do people do dumb things on the Internet and how can we stop them? In this article, security practitioners and cognitive psychologists reveal all.
We live in an age of massive security breaches, but what can firms do to regain consumer confidence after a hack? We polled the public to find out.
The world of IT security is changing so fast it’s difficult to keep pace. In this article, we ask experts to predict the shape of security careers to come.
PCI DSS compliance is a headache for many businesses. In this article, experts identify the main points of audit failure and provide solutions.
Confused about SIEM? Baffled by VPN? Vague on vulnerability scanning? Worry no more! In this article top experts demystify IT security buzzwords.
Three prominent women working for IBM, Cisco and Kaspersky Labs tell their stories, and offer tips, advice and insights into the world of IT security.
Heartbleed is one of the worst security bugs in the history of the Web, but does the public care? Our survey exposes massive ignorance and indifference.
Do Macs get viruses, or is your Apple computer a special snowflake? How do you protect MacBooks and iPhones? We asked, top experts answered!
Confusing jargon abounds in IT security. In this article, top experts from international firms define Threat Intelligence, NAC and IAM in plain English.
IT security terminology can be mystifying for business owners. In part two of this series, experts translate DLP plus web and email gateways into plain English.
IT security is a world of confusing terms and technical jargon. In this article, five experts translate EPP, UTM, MDM and NGFW into plain English.
A guide to top scholarships for aspiring IT security professionals, including awards available from Hewlett Packard, (ISC)² and the U.S. government.
Mobile malware is on the increase. Here are four steps companies can use to mitigate risk and reduce the chances of infection.
Two-factor authentication is a form of added security protection businesses can use to protect sensitive data. Here is what you should protect first.
Three experts advise business owners and executives on how to get the most revealing answers from an IT security consultant during an interview.