SECURITY

Subscribe
 

Nine Things You Need to Know About Insider Threats

The majority of enterprises can neither detect nor deter insider threats, according to a new survey. As a result, they are vulnerable to fraud, data breaches, and intellectual property theft. Sixty-one percent of respondents say they do not have the ability to deter an insider threat, 58 percent admit that they cannot detect an insider threat, and 75 percent say they cannot detail the human... Read More »

How to Prevent Insider Threats

Insider threats aren't going away anytime soon. Unfortunately, most businesses say they lack the ability to detect or deter them, nor are they adequately prepared for how to respond.

Read More »

Mapping to the NIST Cybersecurity Framework

Organizations can use the NIST Cybersecurity Framework, together with other information risk management tools, to build a robust cyber-resilient approach.

Read More »

11 Ways IoT Affects Security (And What You Can Do)

As the Internet of Things (IoT) grows, a variety of seemingly innocent consumer devices are connecting to companies' networks. They have the potential to negatively affect corporations, including compromising enterprise security. When employees bring their devices to the workplace, they connect them to company Wi-Fi and networks, giving hackers and intruders a new way to get in. Even worse,... Read More »

11 Challenges for Today's CIO

The 21st Century will be remembered as a highly transitional time for CIOs—for better and worse. On the positive side, there are more opportunities than ever to ascend to a senior leadership role. But there's also much at stake as CIOs have to advance the capabilities of tech within an environment of relentless, disruptive change—all while... Read More »

The Problem With Online Financial Fraud Prevention

Ross Hogan, global head of the Fraud Prevention Division for Kaspersky Lab, discusses the results of a new survey on how businesses are addressing online financial fraud.

Read More »

10 Tips for Managing Open Source Vulnerabilities

As software development becomes more collaborative, technology organizations are increasingly incorporating open source content into their software development environments. Linux is prevalent in data centers and Apache is in web services. And OSS is more prevalent in the Internet of Things than ever. Developers have used OSS for years and visit repositories like Read More »

Three Things CIOs Should Know About Cyber-Security

CIOs need to be aware of bring your own everything and cloud trends in the workplace, new privacy and data breach regulations, and evolving security threats.

Read More »

What to do When a Data Breach Occurs

Data breaches are inevitable these days, which is why having a well-defined incident response plan and team in place is a necessity.

Read More »

How a Security Company Zapped Zombie Zero

A security company has discovered Chinese malware, called Zombie Zero, which attacks shipping companies through handheld scanners used to track shipped inventory. The malware has hit a large manufacturing company as well as seven customers that use handheld scanners. The security company that made the Zombie Zero discovery is TrapX, formerly... Read More »

Read More From Our Security Archive »