wearable tech
Unmanaged wearables infiltrating the enterprise
Centrify has announced results from an onsite survey conducted at the RSA Conference 2016 regarding the prevalence of wearables in the enterprise and the growing concern they …
Fitbit, warranty fraud, and hijacked accounts
Online account hijackings usually end up with the account owners being the main victims, but there are fraudsters out there who are more interested in ripping off companies …
Reflections on virtualization security and the VENOM vulnerability
Virtualization is undoubtedly a great IT tool that enables organizations to quickly run new instances of servers and workstations, helps isolate environments, and allows for a …
The most damaging ramifications of DDoS attacks
More than half of IT security professionals (52 percent) said loss of customer trust and confidence were the most damaging consequences of DDoS attacks for their businesses, …
Threat intelligence: Sources, sharing, utilization and the government
More than three quarters of IT security professionals (81%) believe the government should be sharing more threat intelligence information with the private sector, according to …
Data-centric security with RightsWATCH
The fact that sensitive data seems to increasingly follow a pattern of being leaked, lost or stolen, has forced security professionals to rethink how their organizations can …
TLS security: What really matters and how to get there
Deploying TLS securely is getting more complicated, rather than less. One possibility is that, with so much attention on TLS and many potential issues to consider, we’re …
How to evaluate the efficiency of a Data Loss Prevention solution
How do you measure the Return of Investment on Data Loss Prevention (DLP) technologies? How do you know that your DLP solution is efficient? In this podcast recorded at …
How data-centric security works
The traditional methods of how to address information security have all been for ages about protecting the perimeter and the network, protecting where the files are located. …
Windows 10: More security with non-stop patching
Microsoft is ready to abandon the longstanding patching schedule that saw patches and security updates being delivered on the second Tuesday of every month. With the advent of …
CSA releases tool for personal data legal protection
At Infosecurity Europe 2015, the Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group released the Privacy Level Agreement (PLA) v2, a tool that provides …
Access control and password management solution for privileged endpoints
Bomgar and Thycotic have partnered to provide enterprises with better control and visibility of access to critical endpoints and privileged accounts.Bomgar Privileged Access …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments