Home > RSS Feeds > Security
  • A study shows that there's been little change in the way companies in various industries manage their third-party vendors—and there's vast room for improvement.

  • The genomic analysis firm protects sensitive data with intrusion detection and vulnerability scanning and uses log management to help track and monitor behavior.

  • A major communications firm turned to more robust identity management to simplify logins and boost security, revamping its systems and practices in the process.

  • Mitigation programs can help organizations strengthen their position against internal threats by providing early detection of threats and a quick response.

  • Cyber-security is now frequently discussed at board meetings, and members are starting to hold CEOs and other upper-level management responsible for breaches.

  • Part 2 of this cyber-security series reports on three additional themes that differentiate companies in terms of the effectiveness of their security strategies.  

  • There are significant differences between companies that have made major improvements to their security effectiveness and those that have not. (Part 1)

  • By now, it's apparent to just about everyone that digital technologies are both a blessing and a curse. They create new opportunities but also introduce bold new challenges. Mobility is at the center of this universe. It has revolutionized the enterprise, but it has also unleashed new risks and dangers—many revolving around bring-your-own-device (BYOD) and bring-your-own-apps (BYOA) initiatives. A new "Mobile Security Report" from cyber-security firm Spikes Security offers some insights into the state of mobile security. Among the key findings: Malicious exposures are common, a lack of knowledge about risks and prevention is prevalent, and the use of insecure devices and networks is near epidemic. The good news is that IT professionals are aware of these problems. "Nearly all respondents—99 percent—have concerns about mobile security," said Peter Tsai, IT content manager at Spiceworks. Franklyn Jones, CMO of Spikes Security, added: "The same challenges that IT security teams have had to deal with for on-premise users now apply to the growing number of mobile users. … The key difference is that, while on-premise network security is fairly mature, many organizations are still trying to understand how best to protect mobile users." The study is based on a Spiceworks survey of 160 IT professionals from organizations of 100 or more employees. Here's a look at some of the study's key findings and what IT leaders can do to mitigate dangers.

  • Interval Leisure Group turned to a simplified, streamlined approach to privilege management to provide role-based access controls for workers and consultants.