Please turn on your JavaScript for this page to function normally.
Unmanaged wearables infiltrating the enterprise

Centrify has announced results from an onsite survey conducted at the RSA Conference 2016 regarding the prevalence of wearables in the enterprise and the growing concern they …

Fitbit
Fitbit, warranty fraud, and hijacked accounts

Online account hijackings usually end up with the account owners being the main victims, but there are fraudsters out there who are more interested in ripping off companies …

Reflections on virtualization security and the VENOM vulnerability

Virtualization is undoubtedly a great IT tool that enables organizations to quickly run new instances of servers and workstations, helps isolate environments, and allows for a …

The most damaging ramifications of DDoS attacks

More than half of IT security professionals (52 percent) said loss of customer trust and confidence were the most damaging consequences of DDoS attacks for their businesses, …

Threat intelligence: Sources, sharing, utilization and the government

More than three quarters of IT security professionals (81%) believe the government should be sharing more threat intelligence information with the private sector, according to …

Data-centric security with RightsWATCH

The fact that sensitive data seems to increasingly follow a pattern of being leaked, lost or stolen, has forced security professionals to rethink how their organizations can …

TLS security: What really matters and how to get there

Deploying TLS securely is getting more complicated, rather than less. One possibility is that, with so much attention on TLS and many potential issues to consider, we’re …

How to evaluate the efficiency of a Data Loss Prevention solution

How do you measure the Return of Investment on Data Loss Prevention (DLP) technologies? How do you know that your DLP solution is efficient? In this podcast recorded at …

How data-centric security works

The traditional methods of how to address information security have all been for ages about protecting the perimeter and the network, protecting where the files are located. …

Windows 10: More security with non-stop patching

Microsoft is ready to abandon the longstanding patching schedule that saw patches and security updates being delivered on the second Tuesday of every month. With the advent of …

CSA releases tool for personal data legal protection

At Infosecurity Europe 2015, the Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group released the Privacy Level Agreement (PLA) v2, a tool that provides …

Access control and password management solution for privileged endpoints

Bomgar and Thycotic have partnered to provide enterprises with better control and visibility of access to critical endpoints and privileged accounts.Bomgar Privileged Access …

Don't miss

Cybersecurity news