Dropbox

Is Anything Really Safe In The Virtual World We’ve Created?

Jessica Lang from Kaizen reveals the ten cyber attacks that have rocked the world in recent years, and hit 5.4 billion accounts in total.

Seriously?! Can You Not Do That? | Chapter II

Even with new technologies abound, we’ve come to rely on passwords as our primary means of managing access to systems, applications and data. In reality, passwords are our first—and in most cases, only—line of defense when it comes to protecting against unauthorized access, misuse and theft.

Balancing Security and Privacy in the Enterprise

Enterprise security teams have a namesake job to do – secure their organizations – but it does not have to come at the expense of their colleague’s privacy. How, then, do organizations balance the requirements and expectations of both sides and keep their data secure while ensuring that the company refrains from violating privacy laws?

Seriously?! Can You Not Do That? | Chapter I - Bad Habits and InfoSec Apathy

People go to work to do their job. They have meetings to attend, calls to make, tasks to complete, quotas to reach, and much more. So they can’t be bothered with worrying about information security. However, their habits – good and bad, innocent or malicious – are putting their employer’s business at risk. All it takes is one poorly made decision, or maybe even the lack of a decision in many cases, to damage or even destroy a business.

8 Companies with Chief Diversity Officer Positions

The topic of diversity in the workplace has gotten more attention in the last few years, but what does that really mean in the tech industry? Many companies have put their money where their mouth is and created a Chief Diversity Officer position. Here are eight of them.

Ageism in the Tech Industry & Other Bias. Let’s Fight ‘Em All

When it comes to the tech/InfoSec/cybersecurity industries, how important is age? Should the number of times you’ve gone around the sun be irrelevant or does growing up with technology actually make you better qualified for a tech job?

Legacy Tech: Someone or Something Might Be Lurking in The Shadow

Just when you thought it was safe to come to the office, your legacy systems have left you to fend for yourself. In this Experts Corner, expert Greg Hoffer explores the challenges associated with leaving legacy systems behind when moving to new business technologies.