Data Security

Securing your data and network, inside and outside the perimeter

DNS Security Too Often Ignored

23 Jun, 2016

A couple of recent studies show how vital DNS security is and how much a DNS-related security incident can cost you. ...More >

Too Little Is Done Internally to Prevent Insider Threats

20 Jun, 2016

Seventy-two percent of IT security professionals aren’t confident in their ability to manage or control employee access to sensitive files. ...More >

DNC Hack an Example of the Damage Caused by a Breach

16 Jun, 2016

The DNC hack is a high-profile example of what can happen if cybersecurity isn’t taken more seriously. ...More >

Until End Points Are Controlled, Early Breach Detection Remains Difficult

13 Jun, 2016

Until there are stricter controls over the multitude of end points, early detection is going to remain a struggle. ...More >

Dramatic Increase in Phishing Proves Its Effectiveness

09 Jun, 2016

Researchers have found a significant jump in phishing attacks in the first quarter of 2016. ...More >

Even ‘Dead’ Social Media Sites Are a Gold Mine for Hackers

06 Jun, 2016

The bad guys haven’t forgotten about sites like MySpace, and chances are good they’ll find that treasure and use it to their advantage. ...More >

Cybercrime: Who Do You Call When There’s a Cybercrime?

02 Jun, 2016

We have built a regulatory framework that is ineffective at recognizing, let alone combatting, cybercrime. ...More >

Cybercrime: Who Is in Charge of Law Enforcement?

31 May, 2016

Guidance Software CEO discusses the relationship of private versus public sectors, particularly when it comes to the jurisdiction of security events. ...More >

A Year After the OPM Breach Federal Agencies Still Fail at Cybersecurity

26 May, 2016

It all comes down to accountability, and federal agencies are severely lacking when it comes to cybersecurity-related accountability. ...More >

Cybercriminals as Business Competitors

23 May, 2016

If cybercriminals are treating crime as a viable business operation, shouldn’t you be thinking about cybersecurity in business terms, too? ...More >

Pages:   1 23Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.