Looking at insider threats from the outside
Cybersecurity is a never-ending battle requiring around-the-clock attention. From malware to DDoS to APT attacks, front-line IT security teams are being constantly bombarded. …
6 best practices to assure PCI compliance
With recent PCI DSS compliance incidents costing companies millions of pounds in fines and losses and inflicting damage to valuable brand reputations, Netwrix is urging …
Using Hollywood to improve your security program
I spend a lot of time on airplanes, and end up watching a lot of movies. Some of my favorite movies are adventures, spy stuff, and cunning heist movies. Recently, I realized …
Layered security in the cloud
When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. …
9 tips for communicating your BYOD policy
If an IT department creates a BYOD policy and no one at the company knows about it, does it actually make an impact? I’ll spare you the suspense – the answer is …
The evolution of backup and disaster recovery
In this interview, Amanda Strassle, IT Senior Director of Data Center Service Delivery at Seagate Technology, talks about enterprise backup issues, illustrates how the cloud …
8 online safety rules for college-bound kids
Iovation is providing eight digital safety tips for college-bound kids. Previous generations didn’t need to have “the digital talk” but in a world where what …
IT security training: Be proactive
Security is a fast paced industry. You only need to use the Internet for a short time to understand how and why the activities of digital criminals pose a real and significant …
How hackers get in: Lessons from a network security audit
Data security is a defining challenge for our time, yet many businesses and other organizations remain under-prepared. The problem stems from numerous sources: lack of concern …
Selectively re-using bad passwords is not a bad idea, researchers say
For all the repeated advice to use different, complex password for each online account, users are still opting for easy-to-guess, short ones and use them repeatedly across …
Endpoint security myths and why they persist
In this interview, Roman Foeckl, CEO of CoSoSys, illustrates the most prominent endpoint security myths and explains why they persist. Furthermore, he talks about the hurdles …
Securing the virtual environment
So you have you a shiny new virtual environment up and running. You may have virtualised all your servers, so that your business-critical databases, CRM systems, ERP …
Featured news
Resources
Don't miss
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)