Hacker

Hacker News

View All News

Hacker Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Hacker Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Emerging hacking trends worry seasoned security professionals

    Video: Some new hacking trends have security professionals worried, including Robert "RSnake" Hansen, who notes the speed and motivation of today's attackers. Continue Reading

  • How enterprises can protect against weak cloud passwords

    Weak passwords are a common threat to enterprises relying on cloud services. Expert Dejan Lukan reviews some password best practices. Continue Reading

  • Is third-party vendor management the next IAM frontier?

    Identity and access management deployments are notoriously complex. And things are getting worse as legacy technology meets next-generation applications. As the traditional network perimeter continues to disappear, robust IAM becomes more important as a layer of defense to protect sensitive corporate data from the threats posed by third-party vendors. In this issue of Information Security magazine, we evaluate the controls that can help protect data as it becomes more widely accessible. Today's IAM programs manage a far wider range of user types and access points. Bring your own device, cloud computing, and the rapid spread of distributed applications and data have all added to the security challenges.

    In this issue, we also look at enterprise mobility strategies. As more companies embrace a mobile-first strategy, security programs increasingly provide some level of support for personally owned devices and apps. But enterprise mobility is a double-edged sword: Providing broad data access and communication capabilities for much of the workforce can introduce challenging security issues. More CIOs and CISOs are recognizing that coherent policies are the key to harnessing the benefits of bring your own device.

    Finally, cybersecurity skills shortages are widespread. The skills to combat advanced threats have outpaced those needed for conventional IT security. We look at strategies that may ease the pain as enterprises compete for a highly sought-after global workforce. Continue Reading

View All Evaluate

Manage Hacker

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Hacker Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close