Security

Articles

5 Key Ways to Keep File Sharing Secure

Here are five simple protocols companies can put into place to make sure data is secure, while still allowing for successful collaboration. More >

Alert Logic Brings Application Security to AWS

Rahul Bakshi, senior director of product for Alert Logic, says Alert Logic Cloud is designed to provide security controls for the applications and services running on top of AWS. More >

Why SMBs Should Consider VPNs for Secure Network Access

Once seen as a security solution for enterprise network access, VPNs are becoming a solution that even SMBs should consider for accessing data outside the company's walls. More >

Windows 10 Ransomware Scam Represents Growing Trend in Malware

Scammers have created a new phishing scam by which they send a fake link to download the new Windows 10 OS, in hopes of holding PCs for ransom. More >

Have Cyberattacks Become Nation-State Attacks?

As authorities dig deeper, they find that several recent breaches may all link back to one Chinese cyberespionage group. More >

Important Advice on Surviving an Employee Data Breach

It's important to keep in mind that employees are arguably an organization's biggest asset, and therefore require different considerations than other audiences potentially affected by a breach. More >

More Articles >

Interviews

MacKeeper Has More Work to Do to Clean Up Its Act

A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.

More >

A Conversation About Symantec’s 2015 Internet Security Threat Report

A Symantec exec breaks down the three main categories of cybersecurity threats.

More >

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.

More >

More Interviews >

Most Popular Features

Vendor Risk Management: Ten Frequently Asked Questions

As cyber threats become more sophisticated and complex, businesses need not only to ensure they are secure, but also that their vital partners, suppliers, and vendors are protecting themselves as well.

Intel and Micron Just Made Every Tech Device You Have Obsolete

Intel and Micron just announced a new memory technology, 3D XPoint, that has the capacity to render many devices we use obsolete.

Email Habits that Contribute the Most to Email Time Suck

Assuming that your average annual cost per employee is $50,000, the time spent with email is costing your company $60 million every year!

Related IT Downloads

Security28 Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...

Misc29 Interfaces for Personal Identity Verification

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity ...

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date