Ideas for defending against cyberespionage
Russian hackers who broke into the networks of Western oil and gas companies used techniques that companies can detect and oftentimes defend against, experts say.
Antone Gonsalves | 02 Jul | Read more
Russian hackers who broke into the networks of Western oil and gas companies used techniques that companies can detect and oftentimes defend against, experts say.
Antone Gonsalves | 02 Jul | Read more
The recent discovery of command-and-control software sending instructions to malware-infected computers from Dropbox raises the question of how such threats can be discovered.
Antone Gonsalves | 30 Jun | Read more
Researchers at Facebook and Carnegie Mellon University have developed a detection tool for man-in-the middle attacks that security pros might find helpful in protecting corporate data.
Antone Gonsalves | 14 May | Read more
The risks of data privacy, residency, security and regulatory compliance remain significant barriers to cloud adoption for many enterprises. While encryption seems like an obvious solution, historically the technology produced usability issues for cloud applications. To complicate matters, putting encryption into the hands of cloud service providers still left the enterprise open to risks such as insider fraud, hacking and disclosure demands from law enforcement.
Debabrata Dash, Ph.D., chief scientist and architect, CipherCloud | 09 Apr | Read more
Last October a large company revealed that an employee mistakenly sent an email to an unauthorized recipient containing the names and Social Security numbers of former employees. Six months earlier, a larage Texas university accidentally exposed personal information about as many as 4,000 alumni in an electronic file accidentally attached to an email sent to one person who had requested a transcript. That's just the tip of the iceberg in insider-triggered security breaches.
Rohit Khanna, executive vice president of global strategy and corporate development, SEEBURGER AG | 12 Feb | Read more
Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices.
Kim Lindros and Ed Tittel | 20 Mar | Read more
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
Bob Violino | 04 Dec | Read more
It's a Catch-22 for many companies and IT departments: Allow access to social media sites such as Facebook, Twitter and LinkedIn, and the company is opened up to malicious content, phishing schemes and account hijackings. Block all social media sites, and the business risks losing young talent to competitors or will challenge employees to find workarounds. Which can be equally dangerous.
Kristin Burnham | 09 Apr | Read more
It's no easy task implementing a data loss prevention (DLP) program when there's so much disagreement in the security community over what DLP entails. But those who've been through it have good news: It can be done
Bill Brenner | 16 Jul | Read more
This infographic looks at the features and benefits of the Visibility Fabric such as intrusion protection, anti-malware, file activity monitoring, customer experience management, SIEM, data loss prevention, networking performance management, and application performance management.