Security

Subscribe Archives >
 

Shadow Data Emerges as Major Security Risk

15 hours ago | by Samuel Greengard

Business and IT executives are increasingly aware that there's more to shadow IT than hardware and devices. There's also shadow data. Spotting, tracking and controlling data is a growing challenge,... Read More

 
 
 
 
 
 

LATEST STORIES

  • Orange Gives a Green Light to Advanced Security
     
    The Israeli telecom giant turned to an active breach detection system, which applies machine learning and behavioral profiling to identify attack behaviors.
     
    READ MORE
     
  • Carolina Bank Cracks the Security Code
     
    A regional bank turned to multi-factor authentication to create a secure, user-friendly business environment, while boosting compliance with regulations.
     
    READ MORE
     
  • Coping With Cyber-Security Challenges
     
    Cyber-security affects almost every corner of the enterprise, including internal security, the bring-your-own-device (BYOD) movement, customer interactions, and even how organizations hire and train workers on security issues. A recent survey of 649...
     
    READ MORE
     
  • Millennial Workers Put Data at Risk
     
    It's estimated that Millennials will make up 50 percent of the workforce by 2020. While younger workers bring fresh ideas and new enthusiasm into the mix, they also introduce new and different values, as well as additional risks. A recently released...
     
    READ MORE
     
  • School Districts Update Servers, Storage, Security
     
    San Bernardino County Superintendent of Schools deploys an array of technologies to provide a secure, robust network for teachers, administrators and students.
     
    READ MORE
     
  • Mobility Ratchets Up Risks
     
    Mobility has created remarkable opportunities for business, industry and government, but it has also introduced growing risks. A new report from Aruba Networks, "Securing #GenMobile: Is Your Business Running the Risk?" reveals that the mindset of...
     
    READ MORE
     
  • Should Companies Negotiate With Cyber-Criminals?
     
    The meteoric growth of cyber-extortion as a prominent threat faced by enterprises has raised a new ethical conundrum for information security executives: to negotiate or not to negotiate? As extortionists have become more creative and precise in...
     
    READ MORE
     
  • Cyber-Security: Business & Government Interactions
     
    Legal and cyber-security issues are increasingly intersecting. A study shines a light on evolving trends and what business must to do combat threats effectively.
     
    READ MORE
     
  • Business Is Not Prepared for Mobile Malware
     
    One of the biggest challenges organizations face is keeping up with the dizzying array of security risks. Not surprisingly, the mobile environment is increasingly at the epicenter of enterprise concerns. The sheer volume of malware is growing, and...
     
    READ MORE
     
  • Complex Risk Environment Challenges Business
     
    A growing array of digital processes and technologies are ratcheting up the risks for organizations. No longer are threats limited to basic malware, hacking and network intrusions. Increasingly sophisticated attacks—along with newer and more...
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters



















 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date