SECURITY ARCHIVES - Page 4

Training IT Staff for Security Duties to Tackle Overwhelming Threat Intelligence Data

18 Sep, 2017

The good news: More organizations are using threat intelligence to detect and then mitigate potential cybersecurity incidents.

Department of Homeland Security Goes After Kaspersky Security Software

18 Sep, 2017

The Department of Homeland Security is mandating all departments and agencies spend the next 30 days identifying security software in their systems from Kaspersky Lab.

BlueBorne Shows Vulnerabilities in Bluetooth Devices

14 Sep, 2017

Bluetooth is one of those technologies that gets ignored when discussing security risks.

Security Skills Aren’t Keeping up with the Threat Landscape

13 Sep, 2017

We can never think that security training, even for professionals, is done. Skills, like threats, have to constantly evolve.

Attacks on Mobile Devices, Apps and Bluetooth Increase

13 Sep, 2017

Mobile security is a never-ending back and forth between law breakers and those protecting their data, networks and the public. The news this week from that front is not particularly encouraging.

Ransomware and SMBs: The Backup Plan Should Be the Main Plan

12 Sep, 2017

SMBs hit by ransomware are doing a better job of doing the right thing, such as making backups and educating themselves on malware.

Micro Focus Extends Reach of Security Portfolio

12 Sep, 2017

Micro Focus plans to focus more of its efforts on DevSecOps processes that IT organizations are increasingly baking into application development.

IBM Strengthens Linux Security on Mainframes

12 Sep, 2017

LinuxONE Emperor II extends the IBM LinuxONE Secure Service Containers in a way that encrypts data by default in addition to making it impossible for anyone to tamper with an application.

$20M Uber/FTC Consent Decree Points to Uber Practices and AWS as Critical Avoidable Problems

11 Sep, 2017

The FTC alleged that Uber did not take reasonable care, in effect was arguably negligent, in protecting user data.

Lessons to Learn from Equifax Breach

11 Sep, 2017

Organizations of all sizes and verticals would be wise to take a close look at the Equifax breach and learn from the mistakes made in the aftermath. The post-breach behavior was a failure of epic proportions.

Phishing a Concern for Vast Majority of IT Executives

08 Sep, 2017

Phishing is effective. It is wreaking havoc on networks and endpoints and continues to fool even sophisticated users.

Third-Party Vendor Security Mistakes Result in Holiday Data Breach Revelations

07 Sep, 2017

It appears that the security message of Labor Day weekend is that organizations need to step up on holding their contractors to better security practices and to take responsibility for those data breaches.

BackupAssist Secures Backup Files from Ransomware Attacks

01 Sep, 2017

By not allowing a backup to proceed, BackupAssist preserves the last known good backup to acquire, protecting the data any organization would need to recover from a ransomware attack.

Spambot Server Has 711 Million Stolen Email Addresses

31 Aug, 2017

As many experts have said, chances are your information has already been compromised: If not found in this server then it was almost certainly breached in some other attack.

Before Helping Hurricane Victims, Make Sure Your Employees Can Recognize Phishing Emails

30 Aug, 2017

Emotions are running high and many employees want to help those who are suffering. But if they cannot recognize a phishing email, the risk is that your company will become a victim of a cyberattack.

Very Few Large Organizations Taking a Simple Step to Defend Against Phishing

28 Aug, 2017

DMARC validates an email’s authenticity and verifies the sender, which then decreases the ability of a hacker to spoof anyone within that organization.

Hackers Will Take Advantage of Outdated Software

25 Aug, 2017

If you are using outdated or unsupported OS and software, your risk of being targeted by hackers skyrockets.

PAM Solutions: Critical to Securing Privileged Access

25 Aug, 2017

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution.

Drone Rules Still Uncertain as Sector Approaches Cruising Altitude

24 Aug, 2017

It is possible to differentiate between hobbyist and commercial drone use. More broadly, however, confusion at the hobbyist level seems likely to impact the commercial side.

IBM Unveils Alternative Approach to Data Protection

23 Aug, 2017

IBM Spectrum Protect Plus is designed to be deployed on top of virtual machines to also make it simpler for anyone in the IT organization to deploy.

« Prev |  1 | 2 | 3 | 4|5 | 6 | 7 | 8 | Next » Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.