10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

26 Apr, 2017

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions.

Organizations Aren’t Limiting Access to Sensitive Data

26 Apr, 2017

If you want to keep your data from being compromised, you have to protect your data. That includes knowing where sensitive data is stored and knowing who has access to it.

Eastwind Networks Applies Machine Learning to DNS to Improve Security

26 Apr, 2017

Any time new malware is encountered, IT can then treat the Eastwind DNS as a system of record to identify who else in their organization might have been infected by visiting the same site.

Varonis Annual Survey: A Lot of Companies Are Taking Unknown Terminal Risks

25 Apr, 2017

With state-level threats hovering over almost every country, the level of exposure creates issues at a national level and the potential for a single connected trusted company to become the critical path for a nation-level attack.

Three Options to Protect Online Privacy

24 Apr, 2017

People are thinking about their privacy in ways they hadn’t before and are worried about what will happen to information culled by internet providers. Here are changes that will increase privacy protection.

Check Point Aims to Unify IT Security Management

20 Apr, 2017

Because the Infinity Architecture integrates management functions, Check Point says it’s now possible to remediate vulnerabilities in a matter of minutes even when it involves a zero-day threat.

CISOs Admit They Are Unable to Keep Pace with Data Breaches

20 Apr, 2017

If security direction is lacking at the top, it will trickle down through the company and the results could be devastating to the organization.

Despite Cyber Skills Gap, Security Graduates Struggle to Get Hired

19 Apr, 2017

There is a reluctance to hire recent graduates or bring in interns in cybersecurity positions. However, there is no good explanation for why this reluctance continues to linger.

How to Fight Against Ransomware: It’s Hard, Not Hopeless

18 Apr, 2017

Ransomware is causing panic, but three security experts explain that if you put in the work on backup, staff education and other strategies, you can drastically reduce the risk.

Business Leaders See Encryption as Security Layer for Data in the Cloud

17 Apr, 2017

Organizations are slowly making strides when it comes to encryption, but as a cybersecurity tool, it is lagging in its adoption.

Security Professionals Feel More Pressure to Deliver Cybersecurity

13 Apr, 2017

Within an organization, security has to be a shared effort. Everyone needs to step up and stop expecting someone else to take the responsibility. That doesn't always happen.

Fortinet Extends Cloud Security Reach

11 Apr, 2017

Fortinet has made its software available on demand via the Microsoft Azure cloud in addition to improving the way its software automatically scales on the Amazon Web Services (AWS) cloud.

Does Education and Tech Savviness Put You at Greater Risk for Identity Theft?

10 Apr, 2017

According to a survey of more than 2,000 respondents, 18 percent of those who admit to being tech savvy are more likely to become victims of identity theft.

Infoblox Employs Virtual DNS Appliances to Help Combat DDoS

10 Apr, 2017

Being able to deploy DNS as a virtual appliance makes it a lot simpler for IT organizations to employ DNS at scale.

Anticipating and Preventing a Total Laptop Travel Ban

07 Apr, 2017

Analyst Rob Enderle explains why we should take the laptop ban situation as a threat to the electronics industry and IT departments, and what we can do to address it.

By Not Reviewing Mobile App Policies, Users Put Themselves at Risk

06 Apr, 2017

We’ve had it pounded into our heads for years about the risks involved in mobile apps, and yet, we continue to ignore the risks and take our chances.

Why Fake News on PC and Printer Death Is Dangerous

06 Apr, 2017

Not only aren’t PCs and printers going away, both are experiencing a bit of a resurgence. This means our focus on assuring that they don’t become security problems needs to be updated along with our belief that these problems will somehow be self-correcting.

CEO Shares Insights on Preventing Data Loss, Handling Data Breaches

05 Apr, 2017

Datacastle CEO Ron Faith discusses mitigating the risk around employees walking out the door with sensitive company data.

Mist Applies Bluetooth to Asset Tracking

04 Apr, 2017

The Mist Asset Visibility Service makes it possible to embed BLE software to assets, allowing a Mist access point to locate them using an embedded BLE antenna, within 2,000 feet of a Mist access point.

Darktrace Applies Machine Learning to Combat Security Threats in Real Time

04 Apr, 2017

Darktrace Antigena extends the use of machine learning algorithms to enable IT organizations to detect cyberattacks in real time.

1|2 | 3 | 4 | 5 | Next » Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.