Join IBM's Jeffrey Labrador and James Alivihiera to find out how you can use cyber assessments, AI and innovative learning practices to get your high-stakes cybersecurity hiring right.
Discover why effective risk management practices offer a single quantitative threat assessment. The goal: a clear-eyed picture of where risk lies so that you to stay ahead in an increasingly competitive market.
Join eWEEK Senior Editor Sean Michael Kerner as he discusses what the California Consumer Privacy Act is and how it will it impact US vendors, its relationship to GDPR, and what controls and approaches are needed for compliance.
Visibility is a key challenge for cybersecurity teams, and without a holistic view, it’s nearly impossible to detect threats across every stage of the kill chain.
Plan to join us Aug. 8 for an #eWEEKchat about trends in new-generation mobility applications and development of applications and services--and whether Apple has stopped innovating or not.
Cloud service providers need a secure and reliable Linux platform that provides exceptional operational efficiencies, allowing them to consolidate a mix of multi-tenant workloads in a small footprint and deliver differentiated level of service to their clients.
Yes, indeed, we're talking enterprise security once again. There's never a dull moment in this sector; Check Point will release its mid-year 2018 report July 12, and it will discuss cryptominers and crypto-related threats (among others). Join us for the July 11 #eWEEKchat.
Join our panel of experts as they discuss the promise and reality of hybrid storage environments and help devise a winning strategy for your organization.