Intrusion Prevention Systems
Network Access Control
Endpoint Detection and Response
Data Loss Prevention
Enterprise Mobility Management
Mobile Device Management
Threat Intelligence and Analytics
Identity and Access Management
Cloud Security Best Practices
Phil Britt - Article Archives - Page 1
Cybersecurity Risk Management: Finding and Fixing Your Security Vulnerabilities
March 30, 2017
Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.
Point-of-Sale Security Still a Big Problem
October 11, 2016
Despite growing EMV adoption, hackers still see point-of-sale (POS) systems as low-hanging fruit.
Mac Malware Part of Worsening Security Picture
September 2, 2016
While Mac malware is not as big of a problem as attacks meant for Windows, hackers are targeting Apple operating systems more than ever before.
IoT Security Begins with Risk Assessment
May 9, 2016
Weigh benefits of IoT devices against potential security risks to determine on a device-by-device basis if the technology should be used, experts advise.
6 Tips for CISOs Selling Security to the Board
March 15, 2016
Some CISOs may dread presenting to the board of directors. These tips will help ensure it goes well.
10 Trickiest Mobile Security Threats
February 18, 2016
Mobile apps are popular with knowledge workers and hackers alike. Which 10 mobile security threats are the most problematic for security pros?
6 Cybersecurity Insights from SC Congress
December 28, 2015
Cyber insurance and new approaches to security patches were among topics on the agenda at the recent SC Congress.
Procuring Security Tech a Hassle? These 9 Tips Will Help
December 3, 2015
Procuring enterprise security technology can be tricky. A government CISO offers nine tips that will help the procurement process go smoothly.
6 Lessons Learned from Anthem Data Breach
November 5, 2015
Anthem's recent data breach reveals some things Anthem did right – and some it did wrong. Other enterprises can learn from its actions.
Secure IoT from Outset, Experts Say
November 4, 2015
With use of connected devices on rise, enterprises must address IoT security issues from top down, experts say.
Apple vs. Android: Mobile Security Pros and Cons
August 31, 2015
Both Apple's iOS and Android have security strengths and weaknesses, experts say.
Can Sharing Threat Intelligence Prevent Cyberattacks?
August 19, 2015
The Obama administration and some in the private sector believe sharing threat information can help thwart cyberattacks. But not everyone is convinced.
Hackers Make Financial Services Firms Top Target
July 14, 2015
Hackers target financial services firms 300 percent more than companies in other verticals, says Websense Security Labs.
Phishing Attacks: Not Sophisticated, but Successful
March 31, 2015
While companies spend big bucks on combating advanced malware, users still fall prey to email phishing scams.
Mobile Payment Fraud a Growing Problem: LexisNexis
March 2, 2015
Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.
Email Is Not Forever: Advice on Archiving
February 6, 2015
In the wake of the Sony scandal, companies may wonder how long to retain email. Hint: The answer is not "forever."
Dealing with a Data Breach: Tips from the Trenches
December 9, 2014
Thorough documentation and clear communication can make dealing with a data breach a little less painful.
SECURITY DAILY NEWSLETTER
GET SECURITY NEWS IN YOUR INBOX EVERY DAY
TERMS OF SERVICE
LICENSING AND REPRINTS
Copyright 2017 Quinstreet Inc. All Rights Reserved.