The definition of hybrid cloud varies depending on who you ask, but it always involves using both private and public clouds, and you need a strategy.
Stories by Stacy Collett
Credit and payment card thieves are getting more sophisticated as chipped cards drive them to account takeover and card-not-present schemes.
Evolving ransomware and DDoS attacks, new technology such as IoT, and changing user behavior are all good reasons to revise your security policy.
As Steve Martino approaches his 10-year anniversary as vice president and CISO at Cisco Systems, his job has morphed from treating security as simply a must-have to it becoming a strategic imperative for the company.
LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by network filters to allow HR departments the freedom to communicate with prospective job candidates.
As its ‘bad guy’ stereotype wanes, hacker job postings in the enterprise jump 700% in three years.
Who is responsible for preventing DDoS attacks involving IoT devices?
There is no manual on how to get noticed by key executives. Here are some tips for getting on a board of directors as the cybersecurity expert.
In May, FICO upped its own scoring game. It acquired cybersecurity firm QuadMetrics to create its own brand of enterprise security scores for enterprises. The new scoring tool, available in August, uses predictive analytics and security risk assessment tools to issue scores and predict a company’s likelihood of a significant breach compared to other firms within the next 12 months.
Legal professionals are by their nature a skeptical and cautious lot, but the sharp rise in cloud-based applications being used by enterprises and law firms, as well as recent high-profile law firm security breaches, has many legal professionals reticent about entering cloud engagements.
It's IT budgeting time for 2015 -- and Barr Snyderwine is reaching for the stars.
The 2014 Computerworld Data+ Editors' Choice Awards honorees were selected for their ability to make better business decisions using big data.
Welcome to 2013. As IT budgets loosen up and new projects get queued up, IT is learning to quickly tap into creative ideas for competitive advantage in a cutthroat marketplace.
Bernard Madoff, Allen Stanford and California money manager Danny Pang may be the latest examples of outrageous fraud. But what about the little guys? The administrator, middle manager or call-center rep?
In the past, most enterprises defined a disaster as an act of nature--a hurricane, tornado, flood or fire that wipes out their ability to conduct business as usual. Today, with worldwide networks, 24/7 customer call centers and Web applications, a common electrical failure could spell disaster when communication is interrupted in the supply chain, online transactions are halted or networks are down. Online resource Dictionary.com has even added "business failure" to the list of calamitous events that define a disaster.