Unstructured Data, Unending Security Concerns

Eighty percent of respondents to a new survey know of data leakage incidents in their organizations, and while most have implemented technical controls and auditing, only 16% are highly confident in their file security investments. Consequently, there is a gap between file security policies and the efficacy of technical controls, including encryption, to monitor and enforce compliance. David... Read More »

11 Ways to Protect Data in the Cloud

The recent avalanche of security breaches is forcing CIOs to establish new due diligence priorities to protect business data in the cloud. This is an especially timely issue, given the FTC's recent ruling, which Read More »

How a Midsize Company Keeps Rogue Malware at Bay

A leading manufacturer of ceramic products relies on Comodo Endpoint Security Manager to shape its security posture.

Read More »

When Disaster Recovery Plans Are a Disaster

Only a minority of organizations are able to activate their disaster recovery/business continuity (DR/BC) plans with minimal difficulties, according to a recent survey from Janco Associates. In some cases, DR/BC teams don't have the training required to carry out the plan. In others, they fail to properly document their... Read More »

How to Deceive Cyber-Attackers With a Kill Chain

Imagine that you could lie to the cyber-attacker on the other end of the command-and-control console, or fool malware at the affected endpoint, or both. Deception as a defense against attackers is an attractive strategy for enterprises, according to a new Gartner study. Deception technologies use feints to thwart attackers' cognitive processes, disrupt their automation tools, delay their... Read More »

How Midsize Companies Put Large Companies at Risk

Although medium and large businesses are exposed to the same types of threats, they react differently to them, according to a new study. Bitdefender, in partnership with Millward Brown, surveyed 300 CIOs at companies within this size range. They found that 46 percent of large business... Read More »

Essential Traits Every IT Security Pro Should Have

The tech world has been in constant motion while CISOs have been building defenses to ward off attackers, and the changing landscape has created entirely new responsibilities for security professionals, according to Greg Mancusi-Ungaro, CMO, Read More »

Why Cyber-Criminals Target Android Devices

While the global market share of Android smartphones rose 6.4% in the first quarter of 2015 compared to the previous quarter, the number of malware strains outpaced the rise in devices, increasing by 21% since the first quarter of 2014. The study, "Read More »

Why Taking Security Risks Is Vital to Business Growth

CIOs and business executives need to have open dialogue about how to strike a balance between acceptable security risk and reward.

Read More »

The Dangers of Running an OS Beyond End of Life

Microsoft recently cut ties with Windows Server 2003, ending security and compliance updates for the widely used enterprise operating system. Despite the risks, 61 percent of businesses continue to use Server 2003 according to a recent Read More »

Read More From Our Security Archive »
Thanks for your registration, follow us on our social networks to keep up-to-date