Unmanaged wearables infiltrating the enterprise

Centrify has announced results from an onsite survey conducted at the RSA Conference 2016 regarding the prevalence of wearables in the enterprise and the growing concern they …

Fitbit, warranty fraud, and hijacked accounts

Online account hijackings usually end up with the account owners being the main victims, but there are fraudsters out there who are more interested in ripping off companies …

The most damaging ramifications of DDoS attacks

More than half of IT security professionals (52 percent) said loss of customer trust and confidence were the most damaging consequences of DDoS attacks for their businesses, …

Data-centric security with RightsWATCH

The fact that sensitive data seems to increasingly follow a pattern of being leaked, lost or stolen, has forced security professionals to rethink how their organizations can …

How data-centric security works

The traditional methods of how to address information security have all been for ages about protecting the perimeter and the network, protecting where the files are located. …

Windows 10: More security with non-stop patching

Microsoft is ready to abandon the longstanding patching schedule that saw patches and security updates being delivered on the second Tuesday of every month. With the advent of …