Data Security : June 2016 Archives

Securing your data and network, inside and outside the perimeter

Why Companies Should Consider Data-Centric Security

30 Jun, 2016

We don’t pay enough attention to data-centric concerns, like where to find the data and how many endpoints have access to it. ...More >

IT Expected to Act as Security Experts, Even Without Training

29 Jun, 2016

Nearly 70 percent of IT pros do not have any security certifications nor are their employers willing to invest in the training or certifications needed, but they are responsible for security. ...More >

Stranger Danger Lurks in LinkedIn Connections

27 Jun, 2016

Black hats are increasingly looking to sites like LinkedIn to harvest information on employees and their roles within a company. ...More >

DNS Security Too Often Ignored

23 Jun, 2016

A couple of recent studies show how vital DNS security is and how much a DNS-related security incident can cost you. ...More >

Too Little Is Done Internally to Prevent Insider Threats

20 Jun, 2016

Seventy-two percent of IT security professionals aren’t confident in their ability to manage or control employee access to sensitive files. ...More >

DNC Hack an Example of the Damage Caused by a Breach

16 Jun, 2016

The DNC hack is a high-profile example of what can happen if cybersecurity isn’t taken more seriously. ...More >

Until End Points Are Controlled, Early Breach Detection Remains Difficult

13 Jun, 2016

Until there are stricter controls over the multitude of end points, early detection is going to remain a struggle. ...More >

Dramatic Increase in Phishing Proves Its Effectiveness

09 Jun, 2016

Researchers have found a significant jump in phishing attacks in the first quarter of 2016. ...More >

Even ‘Dead’ Social Media Sites Are a Gold Mine for Hackers

06 Jun, 2016

The bad guys haven’t forgotten about sites like MySpace, and chances are good they’ll find that treasure and use it to their advantage. ...More >

Cybercrime: Who Do You Call When There’s a Cybercrime?

02 Jun, 2016

We have built a regulatory framework that is ineffective at recognizing, let alone combatting, cybercrime. ...More >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.