Please turn on your JavaScript for this page to function normally.
Intellectual property cyber theft to rise 58%

The number of intellectual property cyber theft incidents in the next 12 months is expected to increase, according to 58 percent of respondents to a recent Deloitte poll. When …

BYOD
61% of employers have no BYOD policy

Trustlook has shared findings on the latest BYOD trends and best practices from a survey of 320 Android users. “Some findings validated existing beliefs, while others were …

Netwrix
Free tool for Active Directory changes monitoring

Netwrix Change Notifier for Active Directory tracks changes to Active Directory (AD) users, group memberships, OUs, permissions, and provides visibility into what’s happening …

market
Five emerging trends impacting the IT consulting services market

The top five emerging trends driving the global IT consulting services according to Technavio are: Adoption of environment-friendly technology Growing preference for remote …

money
Federal regulators: Increasing cybersecurity stance on financial institutions

Everyone is increasing the attention of cybersecurity given the continued parade of hacking incidents. Just last week, the three main prudential regulators for financial …

motion
Best practices for securing your data in-motion

Security and compliance is at the top of every IT pro’s mind, yet much of that effort is focused on protecting data within the organization that’s “at rest.” While it’s …

danger
Cybercrime not slowing down anytime soon

In Q3 2016, cybercriminals were increasingly more ingenious, using innovative technologies and new tools to spread their wares. This is confirmed by the 18 million new malware …

employee
Organization face security risks due to lack of skilled cyber security experts

According to a study conducted by Dimensional Research among 500 IT security professionals, only twenty-five percent were confident their organizations have the number of …

defend
IoT security: Defending a young industry from attack

As the IoT industry matures, it’s safe to say we’re well past “early adopter” phase and seeing broader development and deployment. While the prospect of a more established and …

arrows
Hackers changing tactics, techniques and procedures

Organizations need to conduct better penetration testing to combat continual changes in hackers’ tactics, techniques and procedures (TTPs), according to NTT Security. “Our Q3 …

SaaS
SMB security: The evolving role of SaaS and IT outsourcing

SMBs need to bridge the gap between smaller IT security budgets and a shortage of expertise to face the very real and growing threat of cyber attacks, according to Kaspersky …

Study Guide 70-410
Study Guide: Installing and Configuring Windows Server 2012

This Study Guide covers Microsoft’s 70-410 “Installing and Configuring Windows Server 2012” exam. It’s the first exam of three exams that make up the …

Don't miss

Cybersecurity news