Security

Subscribe Archives >
 

The Sony Pictures Hack Changes Everything

2 days ago | by Mike Elgan

What you need to know is that the recent breach of Sony Pictures Entertainment should—in fact, it must—change everything you previously assumed about security. Read More

 
 
 
 
 
 

LATEST STORIES

  • Digital Forensics Can Use Facebook to Solve Cases
     
    Given the complexity of data in various mobile devices, clouds and social media, many nontraditional sources must be examined during a forensic investigation.
     
    READ MORE
     
  • IT Security: It's All About Damage Control
     
    Trying to keep the bad guys out of your corporate network isn't even the primary goal any more. Instead, it's preventing them from getting what they really want.
     
    READ MORE
     
  • Disarming Hidden IT Project Time Bombs
     
    How can you tell whether an IT project will be a boon or a bomb? And how can you spot the land mines in time to change course? Three disciplines can help.
     
    READ MORE
     
  • IT Security Teams Face Ramped-Up Pressures
     
    IT security may be one of the hottest sectors for IT-related jobs, but make no mistake: It's not work for the squeamish. IT security teams face a daunting gauntlet of growing cyber-threat fears, data-related security challenges and ramped-up...
     
    READ MORE
     
  • University Takes Control of Its Network Security
     
    Saint Martin's University, a private liberal arts school, takes a focused approach to network control and security, making the IT department more productive.
     
    READ MORE
     
  • Financial Advisory Firm Invests in Security
     
    Pioneer Investments, a global investment advisory firm, turns to a more sophisticated, multilayered defense-in-depth approach to boost security and compliance.
     
    READ MORE
     
  • Securing Public Clouds Can Be Challenging
     
    Despite clear concerns about their abilities to secure infrastructures in a public cloud, companies continue to forge ahead with plans to run their applications in infrastructure-as-a-service (IaaS) environments. Such are the findings of a recent...
     
    READ MORE
     
  • Do Companies Sacrifice Security for Productivity?
     
    Balancing productivity and security is a growing minefield for organizations, particularly as the consumerization of IT accelerates and BYOD (bring your own device) reaches deeper into the fabric of companies. A recent report, "Security in the New...
     
    READ MORE
     
  • Companies Struggle to Deal With Insider Threats
     
    One of the biggest business and technology challenges facing enterprises that are attempting to batten down the security hatches is the ongoing peril of insider threats. In some cases, these breaches occur inadvertently, when employees engage in...
     
    READ MORE
     
  • BYOD Policies Are MIA at Many Organizations
     
    Given the potential that mobility has to significantly affect enterprise operations and security, you would probably expect that more organizations would adopt comprehensive policies supporting their bring-your-own-device (BYOD) initiatives....
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters



















 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date