LATEST SECURITY NEWS AND ANALYSIS

Massive Chicago Voter Breach Underscores Importance of Cloud Security

Over 1.8 million Chicago voters' personal information was exposed online.

Read More

How Amazon Solved The Biggest Cloud Security Threat

NEWS ANALYSIS: New services from Amazon announced this week could help to end unintentional data leaks.

Read More

Staff Shortage: 85 Percent of Cyber Security Pros Say They Need More People

And 70 percent say hiring experienced professionals is a priority, a recent survey found.

Read More

TOP IT SECURITY RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

Read More

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

Read More

IoT Security Startup ZingBox Raises $22 Million

IoT Security Startup ZingBox Raises $22 Million

|

Dell lends some funds to the IoT security specialist's latest round of financing.

READ MORE
Locky Ransomware Returns with New IKARUSdilapidated Phishing Campaign

Locky Ransomware Returns with New IKARUSdilapidated Phishing Campaign

|

Over 62,000 phishing emails delivered the new threat in the first three days of the campaign alone.

READ MORE
Webroot Acquires Securecast for Security Awareness Training

Webroot Acquires Securecast for Security Awareness Training

|

The company ventures into security training to help businesses educate their employees on the dangers lurking online.

READ MORE
Ethereum Blockchain Powers Vault One Password Service

Ethereum Blockchain Powers Vault One Password Service

|

Ethereum isn't just for cryptocurrency anymore as a new startup uses the underlying open-source blockchain to help improve password security.

READ MORE

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

ENTERPRISE MOBILITY MANAGEMENT (EMM)

Mobile end-user devices need to be managed to improve employee productivity and to reduce risks.

READ MORE

CLOUD ACCESS SECURITY BROKERS (CASB)

More companies are moving sensitive data to the cloud, increasing the need to secure that data.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Top Three Gaping Holes in Your Data Security

Your IT team understands the importance of securing the network against data breaches from external threats. Regardless of your efforts, data breaches usually begin from inside your network, often due to lax or unenforced security policies. *Did you know? Insider threats are now the most …

Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats

You know that visibility is critical to security. You simply can't secure what you can't see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight …

Azure Marketplace Labs: Cisco on Azure

Take advantage of this on–demand webinar to learn how to deploy the Cisco Cloud Services Router (CSR) 1000V in two Microsoft Azure environments. Additionally, our cloud expert will teach you to set up a site–to–site VPN, establishing a clear link between geographically …

451 Research - A Deeper Dive into Hybrid Cloud Storage

This report from 451 Research examines the challenges faced by IT teams managing data in a hybrid cloud environment. It identifies key considerations in the areas of security, cost management and performance and provides recommendations for both cloud managers and administrators.
 
SEE ALL WHITEPAPERS
 
Most Small to Mid-Sized Organizations Don't Use Multi-Factor Authentication

Most Small to Mid-Sized Organizations Don't Use Multi-Factor Authentication

|

And just 48 percent of small to mid-sized organizations think their current password policy is good enough, a recent survey found.

READ MORE
Top 10 Enterprise Encryption Products

Top 10 Enterprise Encryption Products

|

Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.

READ MORE
IBM Guardium Data Encryption: Product Overview and Analysis

IBM Guardium Data Encryption: Product Overview and Analysis

|

We review IBM Guardium Data, which performs encryption and decryption with minimal performance hit and requires no changes to databases, apps or networks.

READ MORE
Eset DESlock: Encryption Product Overview and Analysis

Eset DESlock: Encryption Product Overview and Analysis

|

We review Eset DESlock, an enterprise encryption tool that allows remote device wipe and control and ease of management and use.

READ MORE