In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like: What are the coming situational issues surrounding the security of our data? How are we as an organization really doing in securing our valuable information today? What do we need to do in the future to do better? How will we pay for it?
From BYOD to Windows XP end of life, there is no shortage of situational issues. Meanwhile, the bad guys are getting better and data breaches around the world and across industries are significantly affecting the bottom line. Planning for improved security in 2015 is no easy task.
Some IT departments will look to invest in new approaches. That’s why Lumension has partnered with analyst and President of Securosis, Mike Rothman, for the 2015 Endpoint and Mobile Security Buyer’s Guide. In addition to outlining some of the hot issues and recommended strategies, Rothman also outlines 10 questions every buying IT department should ask vendors to receive the best value for your money.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>
IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ... More >>