Revising Data Backup and Business Continuity Handbook

Data Center Knowledge

Channel partners can help data centers move past traditional, non-reliable backup methods to modern solutions that ensure business continuity in the face of disaster Read More. Industry Perspectives

A must-read IT security handbook: TAG Cyber's massive 2017 guide

Tech Republic Security

The handbook includes tech recommendations on 50 controls, interviews, and vendor lists TAG Cyber CEO Dr. Edward Amoroso has created a 1,200+ page resource for cybersecurity pros.

Trending Sources

See You At RSA Conference 2017!

Cloud Musings

JUST ANNOUNCED!! I am personally excited to be delivering the (ISC)² CCSP Two-Day Crash Course at RSA Conference 2017 ! The current state of cybersecurity means there are many opportunities for the industry as a whole to collaborate on new innovations.

Distil Networks uses device fingerprints to detect malicious web bots

Network World

These and other illicit or unwanted activities are described in detail in the OWASP Automated Threat Handbook for Web Applications. This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. Who's that coming to your website? Is it friend or foe? Is it a customer wanting to buy your products, or someone or something wanting to steal your web content?