xxxxxxxxxxxxxxxx

HP

This user hasn't shared any profile information

We’re making it easy for hackers. New technologies like mobile, Big Data, and the Internet of Things expand the attack surface and bring new technologies...

Headlines featuring large-scale cyber breaches at Target, Home Depot, Sony Pictures, and others have taught us one thing—no-one is safe. But who...

Studies show the average time to resolve a security breach once detected is more than 45 days, and companies lose more than $1.6 million during that time....

To avoid being breached, you have to get it right every single time. To breach you, hackers only have to get it right once. Experts advise breaches are...

Agile development organizations often see application security considerations as impediments to the rapid release cycles they strive for. But releasing...

A new survey from IDG Research Services tells the story: most organizations lack confidence in the ability of their security defenses to keep them safe....

In 2014 detected cyber security incidents rose sharply to 42.8 million, and the financial impact of cyber crime increased by 34 percent. An effective cyber...

How does your cyber security program compare to other companies? Where do your security people, processes, and technology place you among peer organizations?...

Your ability to detect and stop cyber attacks depends on the effectiveness of your security operations team. How does yours stack up to the best? And what...

Home security and remote monitoring systems are a major application of the Internet of Things (IoT). Most include sensors, motion detectors, video cameras,...