News - Article Archives - Page 20

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

April 10, 2017 |

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

READ MORE

GameStop Investigating Possible Credit Card Breach

April 10, 2017 |

Credit card data from online purchases made between September 2016 and February 2017 may have been accessed.

READ MORE

Identity and Access Management: Balancing Access and Security

April 07, 2017 |

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

Ransomware Attack on Pediatric Practice Exposes 55,447 Patients' Information

April 07, 2017 |

While the company was able to avoid falling victim to the ransomware, the attackers may have been able to access patient data.

READ MORE

Anti-Ransomware Decryption Toolkit Grows

April 06, 2017 |

The No More Ransom project gains 15 more decryption tools and dozens of new partner organizations.

READ MORE

Scottrade Hit by Third-Party Data Breach

April 06, 2017 |

An employee at third-party vendor Genpact mistakenly left customer information exposed online.

READ MORE

NeuVector and Rancher Labs Partner on Container Security

April 05, 2017 |

The companies team up to head off the inevitable rise in security threats targeting application container environments.

READ MORE

Enterprise Mobility Management (EMM): Securing Corporate Data on Mobile Devices

April 05, 2017 |

When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.

READ MORE

Mobile Device Management (MDM): Controlling Network Access for Mobile Devices

April 05, 2017 |

Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).

READ MORE

BYOD Security: Understanding Bring Your Own Device Security Risks

April 05, 2017 |

The Bring Your Own Device, or BYOD, era has redefined the modern corporate landscape. Learn about the risks - and the tools you can use to securely embrace BYOD.

READ MORE

86 Percent of SMEs Are Underfunding Cyber Security

April 05, 2017 |

And three quarters of SMEs have two or fewer IT security staff members, a recent survey found.

READ MORE

Corsa Appliance Spells a Quick End to DDoS Attacks

April 04, 2017 |

The company's NSE7000 appliance can deflect DDoS attacks under a minute with a negligible impact on network performance.

READ MORE

Different Types of Malware and How to Defend Against Them

April 04, 2017 |

Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.

READ MORE

Major Security Flaws Uncovered in Samsung's Tizen Operating System

April 04, 2017 |

The OS is in use on a wide range of devices, including Galaxy Gear smartwatches and Z1, Z2 and Z3 phones.

READ MORE

Managed Services: A Security Problem and Solution

April 03, 2017 |

Almost any IT function can be purchased as a service, even security. We look at security issues posed by managed services, and the shortcut to comprehensive IT security that managed security services providers offer.

READ MORE

20 Percent of Users Have Never Changed Their Social Media Passwords

April 03, 2017 |

And 53 percent haven't done so in more than a year, a recent survey found.

READ MORE

Nearly a Third of All Malware Qualifies as 'Zero Day'

March 31, 2017 |

An analysis of data collected from over 24,000 Firebox appliances from WatchGuard reveals the daunting security landscape businesses face today. 

READ MORE

Cyber Insurance: Insuring Your Data When Protecting It Fails

March 31, 2017 |

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

49 Percent of Organizations Don't Know if They've Experienced Insider Attacks

March 31, 2017 |

And 74 percent feel vulnerable to such attacks, a recent survey found.

READ MORE

U.S. Congress Removes ISP Privacy Rules

March 30, 2017 |

The NCTA called the repeal 'an important step toward restoring consumer privacy protections that apply consistently to all Internet companies.'

READ MORE