Poulin: You Mod it, You Own It?
If your toaster catches fire because of a design defect, you can sue the manufacturer. If your computer is compromised because of a...
Van Wyk: Security Track Record for iPhone Not an Accident
It’s not just luck. Apple has managed to keep the iPhone (and its iOS brethren) safe from any major malware outbreak for 10...
Survey: Ex-employees Keep Access to Corporate Apps, Data at Half of U.S. Firms
Former employees at about half of U.S. companies still have access to corporate applications after they leave their jobs, according to new...
March 31, 2017 | DevOps Organization and StrategyBy Michael Pinch, IANS Faculty
— CLIENT PORTAL —>
Please Login to continue
Agile, DevOps and Security: A Primer
Get Up to Speed on the Agile SDLC
Take a Threat Modeling Approach to Protecting Critical IoT Infrastructure
Mark Clancy on the Petya-like GoldenEye Attacks and Tough Choices in Enterprise Defense