SECURITY

Subscribe
 

Cloud Apps Rise Despite Cloud Security Concerns

Cloud computing spend grew 20 percent last year, but security of critical data and systems remain key issues and barriers to adopting cloud services. As a result, cloud security concerns are rising as investment in it grows, according to a new report by Crowd Research Partners, but that's not stopping companies from using the cloud. The study, "2016 Cloud Security Spotlight Report," was... Read More »

How More Cloud Services Put the Business at Risk

By now, CIOs and their IT teams must think that they've spent countless hours talking to their organization's employees about the inherent dangers of the Internet age. But risky user behavior is still alive and well, according to a recent survey from Softchoice. The report, titled Read More »

Outdated Security Creates an IoT Danger

The IT community must immediately address Internet of things security because there is a dire need for advanced security for agentless devices, a study revealed. IoT devices are often not addressed in companies' security policies, if indeed any policy exists. In addition, the perceived penetration by respondents of IoT devices is low and they are not confident that their perception is... Read More »

Super Bug Hunters Collect Millions in Bounties

More organizations are adopting bug bounties—incentivized programs that encourage security researchers to report security issues to a sponsoring organization. Bug bounties are moving from novelties to best practices, helping to strengthen the security of products. "2015 was the year companies realized that when it comes to cyber-security, the pain of staying the same is exceeding the... Read More »

Why Security Execs Lack Confidence in Security

A majority of IT security executives are only somewhat confident in their enterprise's security, according to a new survey. One-third of respondents are confident in their security posture and one-quarter said they communicate effectively about security metrics and posture to senior management. These executives continue to rely mainly on quantitative metrics aimed at preventing breaches.... Read More »

Traits Every Digital Security Pro Should Have

The tech world has been in constant motion while CISOs have been building defenses to ward off attackers, and the changing landscape has created entirely new responsibilities for security professionals, according to Greg Mancusi-Ungaro, CMO, Read More »

How Digital Assets Strain IT Security Efforts

A notable number of IT security professionals said a corporate mindset that current measures are “good enough” presents a major obstacle in the pursuit of new security initiatives, according to a recent survey from CompTIA. The resulting report, titled “Practices of Security... Read More »

10 Ways to Prepare for Cyber-Warfare

If you cannot see an attack, how are you expected to stop it? If you were a detective in the physical world, would you rather investigate a burglary using random photographs of what might have occurred, or by using surveillance video of the actual event? "You've heard the phrase ‘antivirus is dead,' right? That's because antivirus often relies on outdated signatures to stop attacks. AV... Read More »

10 Tips to Protect the Data Center

Securing a data center can be challenging for a variety of reasons. You can't secure what you don't see, for example, and almost everything has remote access capabilities and IP addresses to interface with the Web. Too often, security takes a backseat, which leaves hundreds of embedded and... Read More »

The 11 Top Threats That Organizations Face Today

IT and business leaders have plenty to worry about in this new digital age. Changing federal, state or local compliance mandates are handed down every week. A company's reputation can suffer with one click of an unsatisfied customer's post on social media. And then there are all the problems that tie directly to IT, such as network breaches, productivity logjams and data loss. To pinpoint... Read More »

Read More From Our Security Archive »