Want stronger passwords? Understand these 4 common password security myths
Yes, password length and complexity matter, but only if you apply those qualities to the proper security context.
Yes, password length and complexity matter, but only if you apply those qualities to the proper security context.
Diversity remains a problem in IT. But If you’re a person of color and/or female, the situation is far from hopeless, particularly if you arm yourself with the latest information and advice from your peers.
Amazon promises AWS S3 customers that they will be able to identify and protect sensitive data faster with Macie, but is it enough to catch up to what Microsoft and Google offers?
Oracle hasn’t been “just” a database company in a long time, and nowhere is that more evident than in its quarterly critical patch update release, where the bulk of the fixes are in business applications like PeopleSoft and E-Business Suite.
Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind to secure your cloud workloads.
The realities of managing and protecting IT infrastructures puts IT and security personnel in a no-win situation when attacks like WannaCry or ExPetr occur, so stop blaming them.
The tools would let attackers remotely take over any Solaris system around the world
High-profile breaches are just the tip of the iceberg. Many have never been detected or disclosed--and without a major infrastructure changes it's only going to get worse
Blown cover: Malware authors show how easy it is to get encryption wrong and, in the process, help security pros crack their code
Devops is transforming application development; the same principles of automation, integration, and collaboration can vastly improve security as well
You're already breached. Here's how to track down attackers on your network before they wreak havoc
Amazon does a great job with infrastructure, but securing your cloud applications and environment is up to you. Here's how
As the Obama administration prepares to impose sanctions on Chinese companies for economic cyber-espionage, experts question whether the penalties will have significant effect
Malware masquerading as advertising is a growing problem, and the ad industry must figure out how to weed out scammers from legitimate companies