Security

Subscribe Archives >
 

Texas A&M's Cloud Offers Secure Collaboration

11 hours ago | by Samuel Greengard

One of the nation's leading universities adopted a secure collaboration tool to sync, share, access and collaborate on documents on any device at any time. Read More

 
 
 
 
 
 

LATEST STORIES

  • How to Mitigate Software Compliance Risks
     
    Audits used to be done because of whistleblowers or suspicious licensing behaviors. Now, most software providers do audits as part of their business practices.
     
    READ MORE
     
  • Malicious Macros Continue to Cause Damage
     
    Although the methods used for malicious attacks constantly change and those in the crosshairs must continually adapt to new and changing tactics, some old and often forgotten approaches continue to do damage. One of these threats is the malicious...
     
    READ MORE
     
  • Encouraging Women to Choose Cyber-Security Careers
     
    A partnership between Women in Technology and online course-provider Cybrary provides access to free technology training for WIT's members and protégés.
     
    READ MORE
     
  • Ten Top-Paying IT Security Jobs
     
    More than two out of five organizations plan to add new information security positions this year, according to industry research. Meanwhile, 28 percent of IT and information security employees think their companies have a "problematic" shortage of...
     
    READ MORE
     
  • Shadow Data Emerges as Major Security Risk
     
    Business and IT executives are increasingly aware that there's more to shadow IT than hardware and devices. There's also shadow data. Spotting, tracking and controlling data is a growing challenge, and the failure to keep data in tow can have dire...
     
    READ MORE
     
  • Go Beyond Defense-in-Depth for Resilient Security
     
    While defense-in-depth is a good concept for thinking about security, companies should focus on building a more resilient network to better protect their assets.
     
    READ MORE
     
  • Social Media Creates Compliance Risks
     
    Over the last decade, enterprise social media has evolved from an appealing concept to an absolute necessity. Businesses are investing in new tools, systems and frameworks for connecting employees, customers and business partners. According to...
     
    READ MORE
     
  • Is There a Cyber-Security Confidence Gap?
     
    C-level executives don't share the confidence levels of others in the organization that they're giving their board of directors all the information they need to make sound security decisions. While they are confident in their own cyber-security...
     
    READ MORE
     
  • Orange Gives a Green Light to Advanced Security
     
    The Israeli telecom giant turned to an active breach detection system, which applies machine learning and behavioral profiling to identify attack behaviors.
     
    READ MORE
     
  • Carolina Bank Cracks the Security Code
     
    A regional bank turned to multi-factor authentication to create a secure, user-friendly business environment, while boosting compliance with regulations.
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters



















 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date