Tag: Featured


88% feel vulnerable to data threats

July 24, 2017

Via: We Live Security

Organizations are increasingly aware of the threat posed by data breaches, according to Thales’ 2017 Data Threat Report. A remarkable 88% of respondents also admitted to feeling vulnerable to threats, with 9.1% feeling “extremely vulnerable”, which is significantly higher than the […]

Network security

7 tips to secure against IoT cyberthreats

July 21, 2017

Via: CSO Online

For years, experts have warned about the danger of Internet of Thing devices, often built by companies on the cheap with little or no interest in building security into their products. Many of these insecure devices have found their ways into businesses, interacting and […]

Cloud security

Cloud Security Is Not an Either/Or

July 20, 2017

Via: Security Intelligence

Now that cloud has become pervasive, organizations and individuals everywhere need to think about cloud security. To say that data is either fully secure or vulnerable in the cloud would be far too simplistic. Two Schools of Thought There are […]

Cyber warfare

Top Cybersecurity Trends for the First Half of 2017

July 18, 2017

Via: Security Intelligence

Depending on how you look at it, security has thus far had another stellar year in terms of visibility across industry and society, criticality to business, and busyness for IT and security professionals. Still, we’re constantly behind the eight ball […]

Cyber warfare

7 Deadly Sins to Avoid When Mitigating Cyberthreats

July 17, 2017

Via: Dark Reading

Organizations these days are in full swing “going digital,” with bold visions of a bright and shiny future. But too often in their quest for the holy grail of capturing market share, management tends to focus solely upon the digital […]


Who is a target for ransomware attacks?

July 17, 2017

Via: CSO Online

The short answer to the question posed in the headline is ‘everyone’: Every small business, midsized company, enterprise, and organization is fair game, especially in light of the recent WannaCry and Petya attacks (though the latter was an atypical ransomware example). The long answer […]

Identity theft

How Security Pros Can Help Protect Patients from Medical Data Theft

July 14, 2017

Via: Dark Reading

Imagine discovering that a local hospital’s IT system has been hacked and the hackers are threatening to publish patients’ names, addresses, and medical records on the Internet. In September 2016, this happened to 6,000 patients in Oklahoma. As security professionals know, this […]

Cyber warfare

Strengthening U.S. Cybersecurity Requires Looking Beyond Nation-State Threats

July 10, 2017

Via: Security Week

President Trump’s executive order (EO) on “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” is a commendable first step in bolstering the nation’s federal defenses against large-scale cyber attacks and state-sponsored cyber adversaries. The need to combat these types of threats […]

Access control

4 Key Identity and Access Management Priorities and Investment Drivers

July 7, 2017

Via: CSO Online

What drives your decisions around identity and access management (IAM)? According to the 2016 IDC Global Identity Management Assessment Survey, if you’re looking at an IAM solution, you’re likely most interested in one of four things: how effective a solution is, […]

Access control

Current Trends in Identity and Access Management: July 2017

July 5, 2017

Via: Security Intelligence

Identity and access management (IAM) is a mature and well understood domain of security. That doesn’t mean it’s static. While IAM is commonly associated with security — indeed, it is an essential part of a holistic security program — many […]