It's time for the IT security team and the physical security team to work together on a "cyber-physical" security strategy.By Nitin Natarajan, Principal, Cadmus , 11/6/20170 comments | Read | Post a Comment
Security Pro File: Kwon talks about her tenure at DOJ and US-CERT, winning a WiFi antenna contest at DEF CON, voice lessons - and her brief stint as an industry 'float princess.'By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/2/20171 Comment | Read | Post a Comment
When you adjust for cost of living, IT workers often earn more money in smaller cities than in major technology hubs.By Cynthia Harvey Contributor, NetworkComputing, 11/2/20170 comments | Read | Post a Comment
Beleaguered security vendor fights back against Russian-spying claims with new transparency program aimed at assuaging concerns. By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/23/20170 comments | Read | Post a Comment
Executives, managers, mobile developers and people with the word "architect" in their title are at the top of the IT pay scale.By Cynthia Harvey Contributor, NetworkComputing, 10/17/20171 Comment | Read | Post a Comment
Accenture is the latest in a string of major companies to expose sensitive cloud data this year, following Verizon, Deloitte, and Dow Jones.By Kelly Sheridan Associate Editor, Dark Reading, 10/13/20171 Comment | Read | Post a Comment
New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months. By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/11/201712 comments | Read | Post a Comment
If your organization doesn’t have adequate data protection measures in place, including assigning a data protection officer, you could face steep fines next May.By Cynthia Harvey Contributor, NetworkComputing, 10/11/20170 comments | Read | Post a Comment
New reports today say it was a National Security Agency employee, not a a contractor, whose home machine running Kaspersky Lab antivirus was hacked for classified files. By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/6/20170 comments | Read | Post a Comment
Classified information and hacking tools from the US National Security Agency landed in the hands of Russian cyberspies, according to a Wall Street Journal report.By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/5/201714 comments | Read | Post a Comment
DevOps may be up and running for your enterprise. Taking the time to integrate security will keep it that way. By Kiran Chitturi, CTO Architect, Sungard Availability Services , 10/5/20170 comments | Read | Post a Comment
The Equifax data breach should open our eyes to the issue of explicit consent, a concept our peers in Europe are dealing with now.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/4/20170 comments | Read | Post a Comment
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.