home.aspx
 
EVENTS

Cyber Operations for National Defense Summit
CYBER OPERATIONS FOR NATIONAL DEFENSE SUMMIT
September 19-20, 2019
The ability to operate freely in the cyber domain is of critical importance to the United States. DSI’s 6th annual Cyber Operations for National Defense Summit will address the internet and internet-enabled technologies and how they enable much of our communications, economic activities, and m...

2019 CYBER SYMPOSIUM INNOVATIONS IN CYBERSECURITY
2019 CYBER SYMPOSIUM INNOVATIONS IN CYBERSECURITY
September 19-20, 2019
View keynotes from world-class speakers, attend workshops from the top thought leaders in the industry and learn the best ways to handle cybersecurity in a constantly changing world – from corporate concerns to global threats. The NCC Cyber Symposium is a cyber conference for All Types of Lead...

Akamai Technologies Inc.

If you've ever shopped online, downloaded music, watched a web video or connected to work remotely, you've probably used Akamai's cloud platform. Akamai helps businesses connect the hyperconnected, empowering them to transform and reinvent their business online. We remove the complexities of technology so you can focus on driving your business faster forward – enabling you to embrace trends like cloud, mobile and media, while overcoming the challenges presented by security threats and the need to reach users globally.

RELATED NEWS


What do information security professionals consider the biggest threat to their systems and businesses? According to a recent study commissioned by Unisys, the issue most responsible for disrupting the sleep of top security executives is employee negligence or abuse of data warehouses or systems (97%). Insufficient resources to get the job done right (90%) is a close second.
Despite numerous challenges to maintaining security, participants also believe senior management is becoming more s...

TECHTARGET
READ MORE

Ponemon Institute LLC recently surveyed more than 1,000 IT security professionals on the incident response practices in place at their respective organizations. Approximately two-thirds of respondents indicated they believe their companies are under a state of "constant compromise" due to the pervasiveness of malware, botnets and other attacks. Even worse, those same respondents consider themselves too bogged down by security events and event data to determine which incidents warrant a...
TECHTARGET
READ MORE

The past three years were difficult for information security organizations: threats continued to escalate, IT environments grew increasingly complex and the availability of resources to address these problems failed to keep pace with need. Thankfully, good news is on the way. Forrester Research Inc. is witnessing an early trend, arising in sectors such as thepharmaceutical and petrochemical industries, of increased information security spending. Of the three main areas where organizations will i...
TECHTARGET
READ MORE

The Department of Homeland Security has issued the final version of the National Infrastructure Protection Plan, but some say it falls short of being a comprehensive risk management framework for the nation's infrastructure.
The NIPP clearly incorporates cyber security; that is a plus," said John Sabo, director of security and privacy initiatives at CA Inc. Sabo is also president of the Information Technology Information Sharing and Analysis Center (IT-ISAC), a cyber security tra...

TECHTARGET
READ MORE

The FBI wants people trained in cyber security and Norwin High School joined in an initiative with the bureau and Indiana University of Pennsylvania to develop a model cyber security program, an FBI agent told hundreds of Norwin students and parents at its Scheduling Faire for eighth-grade students last week.“We are looking for technical people throughout the FBI. The U.S. government is looking for people with those skills” and private industry is starting to hire people with those s...
TRIBLIVE
READ MORE

The (ISC)2 Security Congress 2013 in Chicago focused on the challenges facing information security practitioners – but what are they and what are the solutions?
Apart from the increasingly sophisticated nature of attacks, information security professionals often find themselves fighting a culture of disbelief in the businesses they support....

COMPUTERWEEKLY.COM
READ MORE

EVENTS

Cyber Operations for National Defense Summit
CYBER OPERATIONS FOR NATIONAL DEFENSE SUMMIT
September 19-20, 2019
The ability to operate freely in the cyber domain is of critical importance to the United States. DSI’s 6th annual Cyber Operations for National Defense Summit will address the internet and internet-enabled technologies and how they enable much of our communications, economic activities, and m...

2019 CYBER SYMPOSIUM INNOVATIONS IN CYBERSECURITY
2019 CYBER SYMPOSIUM INNOVATIONS IN CYBERSECURITY
September 19-20, 2019
View keynotes from world-class speakers, attend workshops from the top thought leaders in the industry and learn the best ways to handle cybersecurity in a constantly changing world – from corporate concerns to global threats. The NCC Cyber Symposium is a cyber conference for All Types of Lead...