ResearchSecurity battles escalate
The extent of the ongoing IT security threat continues to expand in form, scale, and response. While both threats and responses are becoming more sophisticated, so far the threats appear to… Read more »
{"source":"http:\/\/search.gigaom.com\/technology\/cybersecurity\/wijax\/383af13036138b805db0da550b1f5914?authors=cap-laurastuart","varname":"wijax_d63885062923550dfb4de879583805cd","title_element":"h2","title_class":"widget-title","title_before":"%3Ch2%20class%3D%22widget-title%22%3E","title_after":"%3C%2Fh2%3E"}
Alerts notify you of new stories or reports as soon as they are published. They are delivered via email and can be customized by topic and frequency.
Keep an eye on the future, by getting new results in your inbox.
Use the filters below to edit your Alert.
The extent of the ongoing IT security threat continues to expand in form, scale, and response. While both threats and responses are becoming more sophisticated, so far the threats appear to… Read more »
There’s been plenty of hand wringing, nail biting, and finger pointing since the massive Target credit card data breach. Retailers, banks, and payment processors have variously lamented the state of U.S… Read more »
There’s a reason security consistently appears on IT buyers’ lists of priorities and concerns. We looked last week at some of the biggest cloud and IT disasters of 2013, and this… Read more »
According to two Deloitte directors writing in USA Today, the 48% of enterprise boards of directors that have a risk committee may not be sufficient to meet the threat. Depending on… Read more »