×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

Ann All - Article Archives - Page 2

Health Care Industry Susceptible to Cyber Attacks

October 5, 2015
Health care experiences 340 percent more security incidents and attacks than most other industries, finds Raytheon/Websense research.
READ MORE

Who Is Hacking Who – and Why You Need to Know

September 23, 2015
Will knowing who is attacking them help enterprise security pros mount a better defense?
READ MORE

Startup Spotlight: BitSight Technologies' Risk Management

September 4, 2015
BitSight Technologies helps companies manage risks associated with third-party suppliers with a ratings service modeled on those offered by credit bureaus.
READ MORE

Don't Ignore Dark Web Dangers

August 10, 2015
Many businesses do not think they need to worry about the Dark Web, says tech analyst Stephen Arnold. But they are wrong.
READ MORE

Startup Spotlight: BrightPoint Security's Threat Intelligence Management

July 31, 2015
BrightPoint Security enables organizations to share threat intelligence with peers – a tactic that has worked well for cybercriminals, points out the company's CEO.
READ MORE

Wi-Fi Security Needs Work, Says IEEE Group

July 21, 2015
An IEEE study group hopes its research will improve Wi-Fi security.
READ MORE

Startup Spotlight: Prelert's Anomaly Detection

June 26, 2015
Prelert first sold its anomaly detection technology to IT operations teams – but then customers begged them to create similar products for enterprise security.
READ MORE

Fighting Insider Attacks Is Tough: Survey

June 19, 2015
Only 21 percent of respondents continuously monitor user behavior to thwart insider attacks, finds a Crowd Research Partners survey.
READ MORE

Cloud Storage's Data Loss Prevention Problem

June 10, 2015
Nearly 18 percent of files in enterprise-approved apps violate DLP policies, finds a Netskope study. The worst offender: cloud storage apps.
READ MORE

Mobile Apps Live On, Wreak Security Havoc

June 8, 2015
While enterprise security teams fret about mobile malware, dead and stale apps on users' devices pose a far greater mobile security threat, finds an Appthority report.
READ MORE

Which Web Application Security Best Practice Really Matters?

June 3, 2015
Organizations want to build more secure Web applications, but they are having trouble identifying development best practices that really make a difference.
READ MORE

Startup Spotlight: Red Canary's Endpoint Security

May 28, 2015
Startup Red Canary's endpoint threat detection platform combines several best-of-breed technologies and a human analyst team.
READ MORE

Why Isn't User Training a Security Priority?

May 19, 2015
Only about half of companies offer any kind of security training, a CompTIA survey found.
READ MORE

The Millennial Security Risk

May 13, 2015
Millennials more likely than their baby boomer counterparts to engage in risky security behavior, report finds.
READ MORE

Startup Spotlight: Prevoty's Application Security

April 28, 2015
Despite the growing importance of applications, the application layer is a "black hole" of enterprise security, says company's co-founder.
READ MORE

Startup Spotlight: Gurucul's Risk Analytics

March 10, 2015
Data breaches occur when identity is compromised or misused, which is why Gurucul focuses on identifying anomalous behavior that can point to identity issues.
READ MORE

Cisco Security Report Shows Importance of User Education

January 27, 2015
Fighting malvertising attacks and other tricky exploits is nearly impossible without user education, notes a Cisco security researcher.
READ MORE

Startup Spotlight: ThreatStream's Threat Intelligence Platform

January 20, 2015
Getting customers to share information with each other is a key part of ThreatStream's new spin on threat intelligence, a platform called Optics.
READ MORE

9 Enterprise Security Trends for 2015

January 7, 2015
Hackers find new twists for some of their favorite tools, like malware and DDoS, which means organizations need to get even more serious about security in 2015.
READ MORE