The rise of mobile has led many CIOs to fret about data loss from lost or stolen devices. A new study suggests IT theft in the office should be a primary concern.
Thor Olavsrud |
16 Aug |
Read more
A new benchmark survey finds that more than half of organizations have a failing grade when it comes to securing privileged accounts that can give attackers access to their entire networks.
Thor Olavsrud |
26 Jul |
Read more
A new survey finds 76 percent of IT professionals with responsibility for security feel their security teams are brought in too late to have a meaningful impact on digital transformation projects.
Thor Olavsrud |
20 Jul |
Read more
By combining its network visibility and breadth of integrated products, Cisco aims to make it simple for distributed and mobile businesses to deploy effective security while reducing the complexity required to manage it.
Thor Olavsrud |
12 Jul |
Read more
Organizations struggle with making security awareness training programs that work. One expert says that's because we treat security awareness training as an event rather than a continuous program of education that adapts to the risks employees face.
Thor Olavsrud |
01 Jun |
Read more
The threats posed by negligent insiders top many security professionals' lists of security concerns, but even many organizations that have data protection and privacy training programs aren't getting through to their employees.
Thor Olavsrud |
24 May |
Read more
The newly announced Apache Milagro (incubating) project seeks to end to centralized certificates and passwords in a world that has shifted from client-server to cloud, IoT and containerized applications.
Thor Olavsrud |
13 May |
Read more
A year of anonymous data from risk assessments of corporate file systems reveals that many companies are failing to use permissions to limit access to sensitive data.
Thor Olavsrud |
23 Mar |
Read more
If your security strategy only considers malicious insiders when addressing the insider threat, you may be miscalculating the risk. Accidental incidents are nearly impossible to guard against.
Thor Olavsrud |
23 Jan |
Read more
In the wake of data breaches, cyber espionage and cybercrime, organizations in 2015 gave security a higher profile than ever before.
Thor Olavsrud |
30 Dec |
Read more
Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2016, information security professionals must understand these five trends.
Thor Olavsrud |
21 Dec |
Read more
While most companies have processes in place for managing administrative and other privileged accounts -- the sorts of credentials frequently used in high-profile data breaches for the past several years -- most do a poor job of enforcing those processes.
Thor Olavsrud |
17 Nov |
Read more
A new research report by Ponemon Institute finds that a comprehensive security training program with a continuous training methodology can improve the phishing email click rate an average of 64 percent.
Thor Olavsrud |
26 Aug |
Read more
If your information security functions like most, it develops copious amounts of data about the business's security that it delivers on a regular basis. And typically it never gets read.
Thor Olavsrud |
26 Jun |
Read more
Each year, the Information Security Forum, a non-profit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security threats over a two-year period. Here are the top 9 threats to watch for through 2017.
Thor Olavsrud |
18 Mar |
Read more