This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Hewlett-Packard's third annual State of Security Operations Report 2016 found that security operations center maturity remains well below optimal levels, with 85 percent of assessed organizations falling below recommended maturity levels.
The University of Phoenix® College of Security and Criminal Justice and ASIS International announced the launch of the Enterprise Security Competency Model.
Although a majority of Americans remain satisfied with the nation's security from terrorism, this measure has dropped 10 percentage points since last year, from 69% to 59%, and is now back where it was in 2008.
The reality of living without computers, mobile phones and entertainment systems, and managing a transport system thrown into chaos by an absence of traffic lights, trains and subways, may become increasingly common, according to a new academic study.
In a special report to the Security magazine Blog, IBM has unveiled the eighth annual IBM 5 in 5, a list of innovations that have the potential to change the way people work, live and interact during the next five years.
In the digital age, increasing amounts of data are being shared in new and often unanticipated ways. With the proliferation of data, devices and connections comes a set of new security threats. Midsize companies, in particular, are feeling the heat.
It’s a scary world out there. Hackers stalk your networks just waiting to access your data. Identity thieves are busily scheming how to take over your assets. Fraudsters look for ways to take advantage of your good graces for personal gain. Maybe you have total confidence in your information security efforts because your IT team is well-versed at protecting networks and data assets. But what about the business processes themselves, or the people responsible for the day-to-day operations of those processes?