The automated security incident response space is still in its infancy, but several companies are working on the problem of collecting all the security alert data, analyzing it, and triggering automatic remediation processes when appropriate.
Stories by Maria Korolov
With the holiday shopping season coming up, and crooks lining up to take advantage of the stress and confusion, this is a good time for merchants to review their payment security procedures.
This year has been the best of times and the worst of times for open source code and security.
Open source software, once just the domain of technology hobbyists, is taking over the software world
Women make up just 11 percent of information security professionals. Just increasing that number to 22 percent would solve the industry's staffing shortage problem.
Even as women have made dramatic advances in medicine, law, and other fields, the proportion of women pursuing undergraduate degrees in the computer sciences has actually been dropping, from around 30 percent in 1990 to 18 percent in 2010, according to the latest data from the National Science Foundation. As a result, according to the Census Bureau, women accounted for just 27 percent of computer science professionals — down from 34 percent in 1990.
Here are 10 types of links you should never click on.
Whether you're protecting corporate data from internal leakers, hackers looking to steal money from you and your customers, foreign spies, your own government, or employees accidentally leaving their laptops in a taxi, encryption is today's hot go-to tool.
Edward Snowden's leaks about NSA spying may have brought the issue of cloud security to broad public attention, but some enterprise users were already concerned about how to take advantage of cloud-based applications while keeping their data safe.
Here’s a list of the 15 Big Data companies to watch.
With the right boss and the right broadband, these tech workers relocated to paradise destinations
Here are 10 things we love about Ubuntu 13 and 5 things we hate.
When workplace computers moved beyond command-line interfaces to the mouse-and-windows-based graphical user interface, that was a major advance in usability. And the command line itself was a big improvement over the punch cards and tape that came before.
It's free, easier to use than ever, IT staffers know it and love it, and it has fewer viruses and Trojans than Windows.
An emerging technology called Near Field Communication will soon give new meaning to the phrase "tapped out."
- Technical Analyst, Cybercrime Operations VIC
- Technical Analyst, Cybercrime Operations ACT
- Senior Test Engineer - Telecom domain VIC
- Network Designer - Telco VIC
- Infrastructure SME NSW
- Technical Infrastructure SME - VMware / Storage/ Backup NSW
- Change Manager-Port Macquarie NSW
- Service Desk Analyst ACT
- Identity & Access Management Analyst VIC
- Identity & Access Management Architect VIC
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.