That's how much has been spent on the 2014 Winter Olympic Games in Sochi, Russia so far, with the final tab projected to be even higher. Though various elements factor into this being the costliest Olympics ever -- to put things into perspective, China spent $40 billion on the 2008 Summer Olympics -- security is a big one.
Grant Hatchimonji |
27 Jan |
Read more
Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world.
Grant Hatchimonji |
21 Jan |
Read more
These days, a signature-based approach to anti-virus and anti-malware measures simply isn't good enough. Most companies that develop anti-virus solutions realize that. But this hasn't always been the case, and at some point, somebody had to develop the foundation upon which so many security approaches are based today.
Grant Hatchimonji |
09 Dec |
Read more
While virtualization has undoubtedly already found its footing in larger businesses and data centers, the technology is still in the process of catching on in the middle market. But a recent study conducted by a group of Cisco Partner Firms, titled "Virtualization on the Rise," indicates just that: the prevalence of virtualization is continuing to expand and has so far proven to be a success for many small- and medium-sized businesses.
Grant Hatchimonji |
26 Nov |
Read more
Being able to lock your mobile device is important because, in many cases, it's your first line of defense. It may not be the strongest form of security -- in fact, it's arguably the weakest -- but it could prove to be the difference in protecting your organization by keeping the device locked down until mobile device management measures like remote wiping are put into play.
Grant Hatchimonji |
26 Nov |
Read more
Big Data is arguably the biggest buzz term in security today, so it came as no surprise that Noam Chomsky and Barton Gellman had no shortage of words on the subject during their opening panel at MIT's Engaging Data 2013 Conference.
Grant Hatchimonji |
16 Nov |
Read more
For those that grew up with it, the Internet is simply a part of everyday life. While this instills a certain level of comfort and familiarity in these users known as Millennials, it also makes them inherently vulnerable to cyberattacks, if the results of a recent Raytheon study are to be believed.
Grant Hatchimonji |
28 Oct |
Read more
Any employee with access to sensitive data is a potential threat, whether they know it or not. Even if they don't have malicious intentions, the inherent nature of their privilege is what makes them so dangerous.
Grant Hatchimonji |
15 Oct |
Read more
While threats to data security and privacy are often perceived to come from the outside, all signs point to internal threats being just as dangerous, intentional or not.
Grant Hatchimonji |
08 Oct |
Read more
AppRiver, an email and web security solutions provider, has released its Global Threatscape Report for the month of September, documenting the amount of spam traffic caught by the company's email filters in August of this year. While the report does provide information about specific malware threats -- like the fact that X.UPX.App.pakuberc was the most common malware threat in August based on frequency of appearance in email traffic -- it also offered valuable information about the fluctuation of spam frequency and its countries of origin.
Grant Hatchimonji |
07 Oct |
Read more
The results of a recent CXO study that were released by (ISC)2 have painted a picture of just how paradoxical cybersecurity can be from the point of view of CSOs, aptly outlining the challenges that these industry leaders face.
Grant Hatchimonji |
07 Oct |
Read more