Ann All - Article Archives - Page 3

Wearable Tech Shakes up Access Control

December 19, 2014
Marrying access control to wearable technology will vastly improve user experience while boosting security, says Brivo Labs.
READ MORE

Dridex and Email: A Nasty Social Engineering Team

December 11, 2014
Recent social engineering attacks involving Dridex malware illustrate the importance of paying attention to older and infrequently used attack vectors.
READ MORE

Programs Aim to Fill Cybersecurity Skills Gap

November 26, 2014
Symantec's Cyber Career Connection and the Air Force Association's CyberPatriot program both aim to address the cybersecurity skills gap.
READ MORE

Startup Spotlight: Security-as-a-Service Bitglass

November 11, 2014
While most cloud security startups focus on securing cloud infrastructure, Bitglass protects data traveling between corporate networks and SaaS applications.
READ MORE

Mobile Security's Budget Shortfall

October 27, 2014
Sixty-four percent of companies surveyed by the Ponemon Institute do not believe they have enough budget to adequately secure mobile devices.
READ MORE

Malvertising, Online Ad Networks a Dangerous Duo

September 25, 2014
Bad guys are using online advertising networks and popular sites like YouTube to serve malware to unsuspecting Internet users, finds new research from Bromium Networks.
READ MORE

Startup Spotlight: CloudPassage's Software-defined Security

August 18, 2014
As the software-defined data center becomes more common, enterprises are seeking security solutions that are abstracted from the underlying infrastructure.
READ MORE

Dude, How Secure Is My Connected Car?

August 4, 2014
With connected cars becoming more common, experts say vehicle manufacturers should adopt security best practices used by mobile device makers.
READ MORE

Hackers Target Browsers, Especially IE: Bromium Labs

July 24, 2014
Hackers targeted Microsoft's Internet Explorer with an emerging attack technique called action script spray in the first half of 2014, say Bromium Labs researchers.
READ MORE

User Education Key in Fighting Mobile Malware

July 9, 2014
Train users to read and heed mobile application permissions, says McAfee Labs.
READ MORE

Startup Spotlight: FortyCloud's Multi-layered Cloud Security

June 24, 2014
Israeli startup FortyCloud recently opened a U.S. office to grow its business, which focuses on helping companies secure data in the public cloud.
READ MORE

Retailers Partner on Cybersecurity Initiative

May 16, 2014
Retail Cyber Intelligence Sharing Center initiative will make it easy for retailers to share cybersecurity intelligence with each other and with government agencies.
READ MORE

Is Infosec Getting More Stressful?

May 13, 2014
Most IT professionals are stressed out at work, a recent survey suggests. Information security pros are especially stressed, thanks to growing levels of unpredictability.
READ MORE

Startup Spotlight: Cloud Security Specialist Armor5

May 7, 2014
Most mobile security solutions utilize a traditional endpoint management approach, but not the cloud security service provided by startup Armor5.
READ MORE

Are Companies Doing Enough for Cloud Security?

April 30, 2014
Bitglass found that few companies use single sign-on, which the security vendor calls ""the most basic security measure for SaaS adoption."
READ MORE

Cloud Requires Comprehensive Security: Report

April 22, 2014
Alert Logic's annual State of Cloud Security report shows a larger variety of attacks in the cloud, demonstrating the need for more comprehensive approaches to cloud security.
READ MORE

Heartbleed Especially Risky for SMBs

April 14, 2014
Enterprises with IT security staffs should find it easy to implement the patch for the Heartbleed vulnerability. But small companies may struggle to protect their websites and customers, experts say.
READ MORE

Infosec Salaries Among Highest in IT

January 16, 2014
While two reports find that infosec pay is among the best in IT, infosec pros also face some of the greatest on-the-job challenges.
READ MORE

Unwiped Mobile Devices a BYOD Risk

January 10, 2014
Just 16 percent of adults who use mobile devices for work wipe data from old devices when they get a new one. It's important to educate employees about the BYOD risks this creates.
READ MORE