SECURITY

Subscribe
 

How Hybrid Cloud Security Can Defeat DDoS Attacks

Cyber-crime costs come from advanced cyber-threats and businesses' complacency when it comes to protection from distributed-denial-of-service (DDoS) attacks. While many companies have attack-mitigation technology, they may not understand how critical a hybrid security model can be. A broad-scale and sustained DDoS attack can strain the capacity of on-premise appliances, and companies cannot... Read More »

Security Talent Shortage Hurts Business

Large businesses with few full-time security experts pay three times more to recover from a cyber-attack than businesses with in-house experts, said a new report. In addition, an inability to hire new security talent has a direct impact on the damage caused from cyber-security breaches. The survey, “Read More »

Deficient Security Gives Cyber-Attackers Free Rein

Cyber-attackers often enjoy unconstrained time in an organization's network because they outpace their victims' ability to respond, according to a new report. But if companies limit intruders' time to wreak havoc, forcing them to make decisions under pressure, the hackers are more likely to be discovered and taken down. Furthermore, fragile infrastructure, poor network hygiene and slow... Read More »

How to Deal With the Cyber Kill Chain

In the quest to stay ahead of cyber-threats, many cyber-security teams have turned to a well-understood military concept, the kill chain, which details how adversaries structure their attacks. They are working to implement their own defenses in order to anticipate and react to where the attacks are coming from. But Chris Coleman, CEO of LookingGlass, said that most common security... Read More »

How Online Account Access Can Lose Customers

CIOs must help their organizations find an easier way for customers to access their online accounts, Read More »

Are Your Employees Educated About Cyber-Risks?

Enhanced security and compliance are two reasons why companies turn to outsourced partners and managed service providers (MSPs) for their IT needs. Another reason is that many security problems originate with human error among internal staff. A dedicated outside team can provide extra levels of redundancy, enabling clients to improve oversight on sophisticated IT challenges as well as peace... Read More »

The Challenges of Managing Sensitive Documents

While companies have adopted solutions and policies to more securely manage documents, many are getting compromised anyway due to poor file management practices, according to a recent survey from Accusoft. The resulting report, titled "Closing the Document Management Awareness Gap,"... Read More »

How IT Execs Should Set the Tone for Security

Without one person in an organization responsible for managing third-party risk, companies face a serious barrier to achieving effective third-party risk management, according to a new study. The study, "Tone at the Top and Third-Party Risk," was conducted by the Ponemon Institute and sponsored by Shared Assessments, a member-driven, industry-standard body specializing in third-party risk... Read More »

Securing the Cloud Security From the Inside-Out

It's important to have a plan in place to protect against the most common threats to your cloud infrastructure. Understanding your vulnerabilities by thinking like an attacker and mapping your defenses to the cyber kill chain can go a long way in protecting your organization. Taking preventive actions will result in an early warning against the most common threats and help you identify a... Read More »

9 Tips for Choosing a Legacy Modernization Partner

Outdated software systems negatively affect businesses and users on a daily basis. Sometimes, internal issues are minimal (e.g., user interface issues), but too often outdated systems are responsible for millions of dollars in lost business and threaten the security of personal information. This puts companies on the fast track to negative headlines and customer loss. Modernization is... Read More »

Read More From Our Security Archive »