Where is your company on the maturity curve when it comes to building an effective Vendor Risk Management (VRM) program? Take this quick assessment to identify strengths, weaknesses, and opportunities within your current VRM strategy.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding...
Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.
The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...
The problem with legacy platforms is that organizations didn't set out to use outdated tools. But as complexity of the networks and infrastructures grew, so did the need for additional tools to manage the additions.
Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.
Having a local data center gives you full control over your infrastructure, but adding capacity takes massive amounts of time and money. Conversely, a cloud-based data center offers unlimited infrastructure on-demand on a pay-for-use
Together, NetScaler ADC and NetScaler MAS help IT identify faults across all of your ADC environments, enabling you to utilize the data center resources that you need so that you can maintain application performance-and keep costs