enterprise
Cybersecurity still seen as a tech issue, not a business imperative
Cybersecurity is now front and center on organizations’ boardroom agendas, but most chief information security officers (CISOs) have yet to earn a seat at the table. According …
Secure passwords for privileged accounts with Bomgar Vault
At RSA Conference 2016 Bomgar announced the new Bomgar Vault, which helps companies secure, manage, and administer shared credentials for privileged users and IT vendors. …
Unmanaged wearables infiltrating the enterprise
Centrify has announced results from an onsite survey conducted at the RSA Conference 2016 regarding the prevalence of wearables in the enterprise and the growing concern they …
Dell SecureWorks speeds up endpoint intrusion detection, response
Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak, a fully-managed SaaS solution that can slash the time required to detect and respond to …
Critical gaps in IT departments’ approach to enterprise security
A new study by conducted by Ultimate Windows Security, released at RSA Conference, provides visibility into the uses, concerns and challenges that IT departments face in …
Discover, classify, protect and analyze data with TITUS Illuminate
According to a recent Forrester report, data discovery and classification is an often-overlooked yet critical component of data security and control. Today, at RSA Conference …
The everyday application interactions putting enterprises at risk
With greater awareness about the risks of unsecured privileged accounts allowing broad, anonymous access across the enterprise, privileged account security has become an …
War Room app for enterprise incident response and collaboration
Today at RSA Conference, Rook Security introduced War Room, an enterprise app that provides real-time unified incident and crisis management collaboration in the cloud. …
Why the C-suite should care about cybersecurity
Many leaders across the C-suite are confused about who the true cybersecurity adversary is and how to effectively combat them. IBM Security interviewed CxOs, from 28 …
Review: Mobile Data Loss
Employees increasingly use mobile devices for work and to access their company’s resources. That should be, by now, an accepted reality for all those who work in the IT …
VoIP phones can be turned into spying or money-making tools
A security vulnerability present in many enterprise-grade VoIP phones can easily be exploited by hackers to spy on employees and management, says security consultant Paul …
Is Hadoop secure enough for the enterprise?
An ever-increasing number of organisations are turning to big data to gain valuable insight that can be immediately acted on to increase revenue, lower operating costs, or …