P2P File Sharing Policy

The purpose of this policy from TechRepublic Premium is to provide guidelines for the proper use of peer-to-peer file sharing. It includes an authorization form for approval of P2P... Read more »

Check Point: Hackers Dropping Physical USB Drives at Watering Holes

Check Point’s Global CISO discusses the firm’s 2023 threat intelligence, including new AI malice and threat actors spreading malware by dropping flash drives. Read more »

Windows 10 and 11 in S Mode: What Is It and Should You Use It?

Windows in S mode is a setting that prioritizes security and performance by allowing only apps from the Microsoft Store and restricting access to the command line, so it... Read more »

Dreamforce 2023: Salesforce Expands Einstein AI and Data Cloud Platform

The Einstein 1 platform links Salesforce CRM data and generative AI. Plus, Trust Layer allows organizations to have control over their own data. Read more »

Want a New Job? Explore Opportunities at the 10 Top US Startup Ecosystems

Written by: Kirstie McDermott Silicon Valley is just one of a number of key US startup ecosystems fueling startups, all of which drive investment and job creation: check where... Read more »

OneTrust Data Governance Review (2023): Features & Pricing

This is a comprehensive OneTrust data governance review, covering features, pricing and more. Use this guide to find out if it is the best solution for you. Read more »

Microsoft, Apple versus China, spyware actors

It’s a cat-and-mouse struggle as tech giants Microsoft and Apple deal with persistent threats from China state actors and Pegasus spyware. Read more »

Australian Data Breach Costs are Rising — What Can IT Leaders Do?

Australian data breach costs have jumped over the last five years to $2.57 million USD, according to IBM. Prioritizing DevSecOps and incident response planning can help IT leaders minimize... Read more »

Cisco: Booming identity market driven by leadership awareness

A new study by Cisco Investments with venture capital firms finds that most CISOs find complexity of tools, number of solutions and users, and even jargon a barrier to... Read more »

Patch ‘Em or Weep: Study Reveals Most Vulnerable IoT, Connected Assets

Phones, tablets and workstations with unpatched CVEs are a clear and present danger. New Armis study lists the most vulnerable. Read more »
Subscribe to our Newsletter