Security

Subscribe Archives >
 

What's the Problem With Solid State Drives?

3 days ago | by Tony Kontzer

In January 2016, health insurer Centene lost six solid state drives filled with the names, birth dates and Social Security numbers of approximately 950,000 beneficiaries. The incident highlighted the... Read More

 
 
 
 
 
 

LATEST STORIES

  • Police Department Shoots Down Ransomware
     
    The Barnstable Police Department deploys a more advanced storage solution in order to better protect data from cyber-criminals and ransomware.
     
    READ MORE
     
  • Why Cloud Security Is Still a Concern
     
    Over the past few years, clouds have drifted into the mainstream of business and technology. Today, virtually all organizations use clouds in some way, and many of them are adopting a cloud-first framework. But stormy conditions lie ahead. A...
     
    READ MORE
     
  • How Citizen Developers Can Create Security Issues
     
    The majority of IT decision-makers believe that the rise of citizen-developed apps is ushering in a new wave of integration and security issues, according to a recent survey from Appian, "IT & Citizen Developer Tug of War." As a result, many...
     
    READ MORE
     
  • Hackers Use IoT Botnets to Launch Massive Attacks
     
    The recent ransomware attack on an Austrian Hotel's room key system may have served as a wake-up call about the expanding risks introduced by the internet of things, but, as they say in show business, "You ain't seen nothing yet!" The emergence of...
     
    READ MORE
     
  • Managing the Network Improves Security in Missouri
     
    The state's 14 agencies needed a way to track and secure all devices accessing the network. They deployed a system that provided continuous endpoint protection.
     
    READ MORE
     
  • Cloud-Based DR Service Protects Think Tank's Data
     
    A Disaster Recovery as a Service solution safeguards the Wilson Center's data from threats, while offering flexibility, cost savings and peace of mind.
     
    READ MORE
     
  • Challenges of Protecting a Connected Environment
     
    Many connected products have weak security and controls, and that creates points of weakness in a user’s critical private networks, systems and data.
     
    READ MORE
     
  • Data Breaches Affect Customer Loyalty
     
    Online security is full of holes, according to a recent survey of 9,000 consumers in the United States and 10 other countries. Most consumers who are active online—nearly six out of 10— believe they will be a victim of a data breach at...
     
    READ MORE
     
  • Addressing the IT Security Skills Gap
     
    Today's cyber-threats present challenges for even the most tech-savvy IT executives in the most tech-savvy organizations. It's not news that the volume and velocity of threats continue to grow. At the center of the problem? Recruiting and retaining...
     
    READ MORE
     
  • Why Cyber-Security Strategies Are Falling Short
     
    While organizations around the world are more confident than ever that they can predict and detect cyber-attacks, they're still falling short on investments and plans geared toward recovering from a breach. Such is the double-edged finding of EY's...
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters