Security

Subscribe Archives >
 

Guidelines for Responding to Data Breaches

6 days ago | by Guest Author

These practical suggestions will prepare your organization to respond quickly and effectively to what experts consider nearly inevitable: a data breach. Read More

 
 
 
 
 
 

LATEST STORIES

  • Business Needs a Better Approach to Cyber-Crime
     
    Digital technologies and the Internet have made it possible for hackers, thieves, spies and other cyber-crooks to unleash threats on a wider and broader scale than ever before. The results of the "2014 U.S. State of the Cybercrime Survey,"  a...
     
    READ MORE
     
  • The Goal of Thwarting Fraud at the World Cup
     
    The 2014 FIFA World Cup is putting the spotlight on the growing problem of financial fraud, and it's very difficult to prevent fraud with current technology.
     
    READ MORE
     
  • Protecting Your Network in a BYOD Environment
     
    Allowing employees to use their personal mobile devices to access the corporate network can increase productivity and morale, but it also increases risks.
     
    READ MORE
     
  • Insider Threats Are Hard to Stop
     
    Just because companies are more aware of insider threats than ever doesn't mean they've figured out how to top the associated risks to their networks and sensitive data. A new report, "Privileged User Abuse & The Insider Threat," produced by the...
     
    READ MORE
     
  • Creepy Technology Is the New Normal
     
    One era's creepy technology is another era's norm. There's a lot of research to show that an ongoing barrage of anything raises our "creepy threshold" over time.
     
    READ MORE
     
  • Organizations Lack Formal Mobility Policies
     
    The bring-your-own-device (BYOD) approach seems to be "business as usual" at most companies these days, according to a recent survey from CompTIA. However, relatively few of these organizations have implemented a formal mobility policy. While the...
     
    READ MORE
     
  • Dealing With Comment Spam Attacks
     
    Quickly identifying the source of a comment spam attack and blocking comments from the source can limit the attack's effectiveness and minimize its impact.
     
    READ MORE
     
  • Data Breaches Threaten Business Reputations
     
    The potential impact on a company's reputation is the biggest driver determining IT security executives' responses to breaches, according to a recent survey. In its poll of senior corporate security leaders, Courion, an identity access management...
     
    READ MORE
     
  • Spam Gets More Sophisticated--and Dangerous
     
    Because spam filters catch upward of 99 percent of junk email, spammers are using new methods—including carpet bombing spam and using randomized message headers.
     
    READ MORE
     
  • Firms Take a Hands-Off Approach to Mobile Devices
     
    Companies are taking a decidedly hands-off approach when it comes to their employees' mobile devices, according to a recent survey from RingCentral. The vast majority of BYOD (bring your own device) workers are on their own in terms of paying for...
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters