Subscribe Archives >

Is a Huge Infrastructure Breach Coming Soon?

6 days ago | by Tony Kontzer

The big one is on its way. At least, a majority of cyber-security professionals believe that the nation's critical infrastructure will be hit by a major breach within the next two years. Worse, they... Read More



  • IT Hiring Is Expected to Grow for the Rest of 2017
    The already-hot job market for IT professionals is going to get hotter, according to a mid-year survey and forecast from Dice. Among recruiters who specialize in filling tech positions, a larger number anticipate the hiring of more tech pros over...
  • Global Firms Must Gear Up for New EU Data Rules
    Legislation that mandates stronger data protection will take effect in the European Union next May, affecting the way organizations collect, store, manage and protect customer data. Many European and U.S. companies doing business in the EU aren't...
  • Report Paints Bleak Picture of Threat Landscape
    It doesn't take much research to know that 2016 was a bad year on the security front: A cursory review of the headlines tells the story. The year brought a new level of creativity and brazenness among cyber-criminals, who took things to a new level...
  • Tech Industry Supports Sustainability
    A growing number of influential tech companies signed on to the idea of honoring the Paris climate agreement, regardless of what the federal government does.
  • Cyber-Espionage and Ransomware Attacks Soar
    Malware continues to be a major factor in cyber-crime, and a growing volume contains ransomware. That's among the key findings of the 10th annual "Verizon 2017 Data Breach Investigations Report," which is based on data from 42,068 incidents and...
  • Risky Business Is the New Normal
    The arms war between hackers and the business world continues to escalate. Although security tools and methods have improved dramatically over the last few years, cyber-attacks have become increasingly sophisticated, and almost every enterprise is...
  • How to Investigate, Contain, Recover From Breaches
    Verizon's cyber-security report explores prevalent threats and common causes of data breaches, and outlines steps an organization should take to minimize damage.
  • Dealing With Email Security Threats
    Although cyber-security issues seemingly become murkier by the day, one thing is very clear: Email is increasingly at the center of enterprise breaches. However, despite perceptions that these attacks mostly originate from the outside, many breaches...
  • The 10 Most Innovative Technology Companies
    They drive in the IT fast lane, constantly speeding ahead with new advances that are profoundly changing data management, cloud computing, mobility, artificial intelligence (AI), the internet of things (IoT), social media and even entertainment....
  • Hackers Use IoT Botnets to Launch Massive Attacks
    The recent ransomware attack on an Austrian Hotel's room key system may have served as a wake-up call about the expanding risks introduced by the internet of things, but, as they say in show business, "You ain't seen nothing yet!" The emergence of...

News Archives >

Manage your Newsletters: Login   Register My Newsletters