When Rogue IT Staffers Attack: 8 Organizations That Got Burned
Many call them rogue IT staffers, others might consider them IT heroes, and some are still innocent until proven guilty. But whatever the name or intention, these tech-savvy employees wreaked havoc at their organizations - and paid a price.
In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence point for other endpoint management and control functions.
The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing the need to combine dynamic and static testing capabilities.
This white paper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program's maturity.
As bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. Is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?
Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero was able to quickly block the attacks.
IT workers have their choice of many great U.S. cities for work and play (Atlanta, Chicago, Seattle), but what are the cities that you probably should avoid? Here's a very unscientific, highly subjective and unapologetically snarky list of our least favorite U.S. tech job locales.
New York City and Washington, D.C. are among the areas having the most IT jobs available. Check out the list of cities looking for IT professionals along with a few reasons why IT pros might want to search for work there.
In spite of the headwinds from a stormy economy, these start-up companies are down the runway and taking off with innovative products and services for IT security. On their radar can be found a focus on botnet and malware detection as well as mobile and virtualization security.
Still got an old HP or Compaq laying around? CSO Publisher (and packrat) Bob Bragdon does! Rummaging around Bragdon's attic (with some memory help from mobile office expert Catherine Roseberry) provides a look at how mobile device security has evolved.
Executive compensation is under fire, but CEOs are still enjoying perks such as company jets, personal security, financial planning advice and club memberships. Read on to see which tech companies are paying more than $1 million in perks and which ones are anti-perk (notably Cisco and Microsoft).