dcsimg

From the experts who also bring you:

eWeekLogo
ITBELogo
DeveloperLogo
eSFLogo
ServerwatchLogo
DatamationLogo

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Five Common Mistakes with Endpoint Encryption

In these risky times, businesses are starring in high-profile stories of data loss. Protecting the network perimeter is no longer enough, and IT departments are looking at tougher security measures. Encryption at the hardware level is the go-to solution that promises to protect customer …

Securing the Internet of Healthcare Things

The Internet of Things (IoT), a growing network of physical devices with Internet connectivity, can collect and exchange rich data. Organizations utilizing the Enterprise of Things (EoT) are also at a greater risk for data breaches and cybersecurity threats. Healthcare organizations …

SIEM: What’s Missing?

In a landscape of increasing compliance regulations and constantly evolving IT security threats, companies are looking for simple, real-time, 360-degree intelligence.   Security information and event management (SIEM) is now a critical function in business-to-business, …

10 Rules to Protect Workloads in a Hybrid or Public Cloud

A growing mix of organizations now look to external cloud providers to host either a portion, or all, of one or more of their application workloads. Knowing the best way to protect such workloads, however, remains a concern. How can leaders ensure data privacy, regulatory compliance, and …