The average hacker’s in it for the money, doesn’t make much of it

In “Butch Cassidy and the Sundance Kid,” there’s a scene where Butch lays out the economics of his craft when he runs into some tricky defenses: “If he’d just pay me what he’s spending to make me stop robbing him,” he observes, “I’d stop robbing him.” 

Report: After slow growth, tech salaries jumped in 2015

You may not have necessarily noticed it, but according to, salaries for IT pros had one of their best years yet in 2015. 

The 25 worst passwords of 2015: How many of your users made the list?

Passwords should be easy-to-remember, hard-to-guess and unique. Give users who had these 25 passwords credit for getting one out of three right. 

The 4 biggest security blunders of 2016 (so far)

We’re barely two weeks into 2016 and there’s already some incidents that have security pros shaking their heads in disbelief.  

Microsoft’s phasing out more support options

Companies that have struggled to meet Microsoft’s end-of-life deadlines are about to find themselves with even fewer working options. Starting next week, support for Internet Explorer 8, 9 and 10 will end. 

Top 10 security and technology stories of 2015

There have been some major shifts in the tech scene this year. But which have gotten the most attention from readers? 

How one stolen laptop can cost a company $850K

Never doubt the importance of securing devices both physically and with encryption. 

Court: Breaking company policies isn’t hacking

A decision handed down by an appeals court finds employees can’t be charged under an anti-hacking law for breaking workplace policies. The case that led to that decision? The so-called “Cannibal Cop.” 

Security concerns hold small businesses back from cloud adoption

There’s little doubt that the cloud offers promise for small and midsize organizations, but many are reluctant to go all-in. The biggest reason: security fears. 

Companies face inefficiencies, logjams in patching vulnerabilities

One of the most important jobs of any IT pro is keeping systems up to date. But with so many applications and services in use across the organization, that can be a haphazard process – one that leaves key vulnerabilities for attackers to exploit.