Security
Explore Articles
-
Best Security Approach: Layers and Trained Staff
Best Security Approach: Layers and Trained Staff Best Security Approach: Layers and Trained Staff People are a key part of…
-
Many Companies Don’t Use DMARC to Fight Phishing
Companies are vulnerable to domain spoofing and phishing attacks that impersonate their corporate email domains—often because they don’t have DMARC…
-
DevSecOps Transforms the Dana Foundation
There’s a growing recognition that DevOps is critical for digital transformation. Yet, as many CIOs have learned—sometimes the hard way—establishing…
-
Web Apps Are the Most Vulnerable to Breaches
Web Apps Are the Most Vulnerable to Breaches Web Apps Are the Most Vulnerable to Breaches On-premises data centers have…
-
Information Governance Is Poor at Many Companies
Information Governance Is Poor at Many Companies Information Governance Is Poor at Many Companies Many companies report inadequate information governance…
-
Technologies and Sectors Most Vulnerable to Hacks
Technologies and Sectors Most Vulnerable to Hacks Technologies and Sectors Most Vulnerable to Hacks Web developers reported that the government…
-
CIOs Are Turning to Blockchain Technology
CIOs are keenly aware of the complexity of managing digital transactions. As data, goods and money flow across organizations and…
-
Domain Name System Is a Target for Hackers
Domain Name System Is a Target for Hackers Domain Name System Is a Target for Hackers Today’s security solutions have…
-
Most Databases in the Cloud Are Not Encrypted
Most Databases in the Cloud Are Not Encrypted Most Databases in the Cloud Are Not Encrypted In violation of security…
-
Data Privacy Gets More Public
These days, data security and data privacy are top of mind for enterprise executives, including CIOs. Nevertheless, companies falter and…