Most unauthorized data access goes undetected

With a focus primarily on large enterprise organizations, a Vormetric study of 700 IT security decision-makers indicates that there are major gaps between existing security …

Concerns around insider threats escalate

Vormetric announced the results of its “Insider Threat” survey, which surveyed more than 700 IT decision-makers. The study of mid-market and enterprise …

Widespread disregard for corporate cloud policies

While most business professionals are worried about the security of cloud-based applications, they are not deterred from using them to store their personal and professional …

Identify unknown internal email-enabled systems

Sendmail today introduced Sentrion Rogue Email Application Control (REAC) 2.0, the first inside-threat protection application with new Big Data search capabilities to further …

What are users doing after log-in?

Businesses today use up to 50 on-premises applications and 25 cloud-based applications on average, so identity and access management (IAM) technologies to secure data and …

The enterprise security time bomb

Companies are at serious risk of data security breaches as 38 percent of U.S. office workers admit to storing work documents on personal cloud tools and services, according to …

Insider threats and BYOD still a great problem

Insider threats are the greatest concern and that permitting employees to connect their own devices to the network increases the risk of security breaches, according to …