Searched for: "the changing face of vulnerabilities"
- Security (26)
- Microsoft (14)
- Enterprise Software (8)
- Cxo (7)
- Networking (7)
- Mobility (6)
- Software (6)
- Developer (4)
- Open Source (4)
- Collaboration (3)
- Data Centers (3)
- Hardware (3)
- Project Management (3)
- Banking (2)
- Cloud (2)
- Innovation (2)
- Tech & Work (2)
- After Hours (1)
- Android (1)
- Apple (1)
- Big Data (1)
- Printers (1)
- Social Enterprise (1)
About 108 results for "the changing face of vulnerabilities"
Android M will bring a lot of new features and developer tools. Here's a look at some of the Android M announcements at Google I/O.
For startups shopping for VC money, targeting an acquisition is one of the primary options for an exit. To help pick your targets, TechRepublic has broken down how the top 10 tech ...
The purpose of threat intelligence, says Webroot's CMO, is to immediately block cyberthreats through your network and endpoints, and to predict where attacks originate.
Business and liberal arts majors are starting to win information security jobs away from computer science graduates as the changing nature of the job requires softer skills - accor...
Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the serious consequences of the fi...
Regulation and the "sharing economy" was the topic of a recent panel discussion in the U.S. House of Representatives. Alex Howard summarizes the highlights.
The Presidency of Mexico's national digital strategy coordinator, Alejandra Lagunes, speaks with Alex Howard about the country's plan for open government and digital innovation.
18F has quietly become the bleeding edge of the US federal government's adoption of open source software. Read about the benefits and challenges of open source going mainstream.
Jack Wallen compares Google Wallet to Apple Pay and questions the slow adoption of both technologies.
In this paper, about biometric systems the general idea is to use of facial recognition to reinforce security on one of the oldest and most secure piece of technology that is still...