Identifying the five principal methods of network attacks
Companies are underestimating the risk of failing to provide security training to non-technical staff.A new Intel Security study, which surveyed IT decision makers in …
Why is ERP security so difficult?
ERP (Enterprise Resource Planning) security has been all over the news lately. From high profile breaches, like the recent U.S. Office of Personnel Management breach, to …
What a business leader should know about the cloud and its impact
Great companies see business risks as opportunities, and execute strategies accordingly. Such a mentality is compatible with emerging technologies. IT plays a vital role in …
Never underestimate the impact of a data breach
The growth of cyber-crime and the impact of successful attacks on an organization’s bottom-line should not be underestimated; it is anticipated that data breaches will …
We don’t know what we don’t know
Citing the latest cyber security statistics is a popular way for security companies to show that they are keeping a watchful eye on the threat landscape. Where does the …
The best way to prevent data breaches? It’s not what you think
Data security breaches seem to be popping up almost daily. From the 2015 IRS breach, to the hacking of federal government employees’ data by China, it’s clear much of our most …
You’ve been breached, now what?
Everybody tends to think that hackers will never ever target them or their company/organization until a breach occurs. This article concentrate on post-incident actions and …
Four essential tips that you can use to stay safe when you travel
Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your cyber …
Why vulnerability disclosure shouldn’t be a marketing tool
There have been many arguments within the security community on how researchers should disclose the existence of a security vulnerability. Some argue that full disclosure is …
5 ways to stop the Internet of Things from becoming the Internet of Thieves
The Internet of Things is here and is now on your wrist, in your pocket, in your car, and maybe even in your socks. From smart watches and self-driving cars to smart …
The cloud, FedRAMP and FISMA compliance
Many federal agencies and government contractors are migrating to cloud-based computing, a trend that will pick up speed as the cloud becomes more efficient, more affordable, …
How to survive a compliance audit
Ipswitch polled 313 IT professionals in United States with 59 percent noting that they were not fully prepared to undergo an audit. Additionally, 75 percent of respondents …
Featured news
Sponsored
Don't miss
- How much does cloud-based identity expand your attack surface?
- Finding software flaws early in the development process provides ROI
- Zero-day exploitation surged in 2023, Google finds
- NHS Scotland confirms ransomware attackers leaked patients’ data
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)