IT Security
Exclusives


Exclusives

How to Win the Cyberwar

by Anne Bonaparte There is no doubt about it. We’re in a cyberwar and the bad guys are winning. Cybercrime set new records in 2014, with hack attacks up 55 percent from the previous year, according to CSO magazine’s “State of the CSO” survey. And 2015 is on track to be even worse. In fact, Symantec says companies with more than 2,500 employees now have a 1 in 2.3 chance of […]

Exclusives

The Transformation: Three Steps to Adopting a DevOps Security Strategy for your Future Unicorn

by Tim Prendergast DevOps unicorns may be a rare breed today, but that doesn’t mean they’ll continue to be in the future. Even if your company is an old school workhorse, it’s possible to make a magical transformation that breaks down the silos between your developers, security and IT operations and enables the company to develop apps faster and more securely. There are several qualities that define DevOps unicorns. These […]

Exclusives

The DevOps Unicorn: Achieving Success with Speed and Security

by Tim Prendergast The DevOps unicorn. In the IT industry today, these are seemingly rare, mystical organizations that were born in the Internet era and leverage new technologies to break down the traditional silos between developers, security and IT operations. By effectively bridging these environments, the result is a high-trust team that is empowered to innovate, nimble and can quickly improve the competitive posture of their companies. What if your […]

Exclusives

Branch Offices are More Than a Remote Risk to Network Security

by Oliver Tavakoli Cyber attacks and data breaches are a constant concern for virtually every organization. Attackers compromise private data and systems of all types, often by running their attacks patiently and methodically to avoid detection. Hackers begin their attacks by infecting user machines, and leveraging them as an attack foothold to get inside the network, where your crown jewels are stored. Modern cyber attacks succeed by starting with small […]

Exclusives

Are the Computers In Your Network Waging War Without Your Knowledge?

by Fatih Orhan Last month, police from around the world closed a black market cyber hacking group called Darkode, an international “street fair” for illegal cyber activity where financial records could be bought and sold, malware could be developed and rented out, and hacking expertise could be bought and leveraged for nefarious ends. Members of Darkode were stealing data, processing power – maybe even your CPU power. In fact, one […]

WWPI – Covering the best in IT since 1980