Data Security

Securing your data and network, inside and outside the perimeter

PoS Malware Threats Just in Time for the Busy Credit Card Season

26 Nov, 2015

In time for the busiest shopping and travel (and probably overall credit card use) time of the year, we are seeing a number of new Point-of-Sale (PoS) malware and PoS-related breaches. ...More >

Adding a Human Element to Cybersecurity

23 Nov, 2015

If friendly hackers discovered vulnerabilities, how does that information mesh with behavior analytics as a way to add another layer to security detection and prevention? ...More >

Return of Blackhole Shows Surging Popularity of Exploit Kits, Repurposing of Old Malware

19 Nov, 2015

Blackhole returned at the same time we’re seeing a huge jump in exploit kit activity. ...More >

Fake Users Infiltrate Websites; Companies Allow It to Avoid Friction in Registration

18 Nov, 2015

Most companies have no system in place to detect a fake user from a real user, but the consensus is that approximately 10 percent of the user base is fake. ...More >

State Governments Failing in Cybersecurity

16 Nov, 2015

States lack strong cybersecurity, leaving them vulnerable to attacks and unable to address potential threats. ...More >

IT Knows Endpoint Security a Problem; Little Being Done

12 Nov, 2015

Companies continue to struggle with endpoint security. This has to be a serious concern as more employees are connecting to the corporate network through multiple devices. ...More >

Mobile Malware Top Third Quarter Threat

09 Nov, 2015

A common theme in security over the past couple of weeks, especially as companies begin to release their third quarter or fall-based reports: Mobile malware is escalating. ...More >

Odds Grow That Your Company Will Suffer a Breach

05 Nov, 2015

Cyberattacks are going to happen and they are going to happen to your business at some point. ...More >

Security Professionals Disconnected from Security Realities

02 Nov, 2015

In a nutshell, too many security professionals don’t think their company is going to be the victim of an attack. ...More >

Frightening Cybersecurity Stories for Halloween

29 Oct, 2015

This Halloween, think of scary in terms of all the threats to our data, our identity and our corporate well being. ...More >

Pages:   1 23Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.