Securing the Cloud Security From the Inside-Out

It's important to have a plan in place to protect against the most common threats to your cloud infrastructure. Understanding your vulnerabilities by thinking like an attacker and mapping your defenses to the cyber kill chain can go a long way in protecting your organization. Taking preventive actions will result in an early warning against the most common threats and help you identify a... Read More »

9 Tips for Choosing a Legacy Modernization Partner

Outdated software systems negatively affect businesses and users on a daily basis. Sometimes, internal issues are minimal (e.g., user interface issues), but too often outdated systems are responsible for millions of dollars in lost business and threaten the security of personal information. This puts companies on the fast track to negative headlines and customer loss. Modernization is... Read More »

Why Do We Still Need Paper Docs?

By now, we've posted plenty of features about organizations that are fully committed to a digital transformation. But if this is really the case, why are we still dependent upon paper documents to do our jobs? Many businesses, in fact, give their office printer a daily workout, according to a recent... Read More »

Why Paying After a Ransomware Attack Is Futile

A new report finds that paying ransom after a ransomware attack not only further fuels this crime wave, but does not guarantee that lost the data will be returned. "Standard preventive measures, such as anti-virus software, spam filters and regularly updating systems should be taken, but there is no surefire way of preventing ransomware," the report says. Instead, businesses should focus on... Read More »

Managing Mobility Is a Major IT Challenge

Enterprise mobility presents numerous benefits: increased productivity, potential cost savings and improved employee morale. It comes with many potential risks. Between "bill shock" from uncontrolled roaming costs to user negligence causing unmanaged overages to to data loss, managing mobility can be a major challenge. With increasingly sophisticated and more frequent cyber-threats targeting... Read More »

The Rise of Cyber-Crime as a Service

This year began with explosive growth in ransomware domains, according to a DNS threat index, driving an all-time high in new malicious domains. The threat index, which measures the creation of malicious DNSs including malware, exploit kits, phishing and other threats, was created by Infoblox, the network control solutions provider. "There has been a seismic shift in the ransomware threat,... Read More »

How Organizations Commit to Compliance

Reflecting an era when risk has emerged as a growing business concern, senior leadership at nearly all organizations remains committed to compliance and ethics programs, according to a recent survey from PwC. The resulting report, titled "PwC State of Compliance... Read More »

How Digital Assets Strain IT Security Efforts

A notable number of IT security professionals said a corporate mindset that current measures are “good enough” presents a major obstacle in the pursuit of new security initiatives, according to a recent survey from CompTIA. The resulting report, titled “Practices of Security... Read More »

How State Governments Struggle With Cyber-threats

With phishing, social engineering and ransomware emerging as significant threats, state governments are increasing their efforts—and boosting their budgets—to enhance their cyber-security programs, according to a recent survey from Deloitte and the National Association of State Chief Information Officers... Read More »

Top Tips to Secure the Data Center

Securing a data center can be challenging for a variety of reasons. You can't secure what you don't see, for example, and almost everything has remote access capabilities and IP addresses to interface with the web. Too often, security takes a backseat, which leaves hundreds of embedded and... Read More »

Read More From Our Security Archive »